A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837 | Exploit Issue Tracking Vendor Advisory |
https://issues.jboss.org/browse/KEYCLOAK-10780 | Issue Tracking Permissions Required Vendor Advisory |
https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f | Patch Third Party Advisory |
Information
Published : 2020-01-07 09:15
Updated : 2020-01-15 07:43
NVD link : CVE-2019-14837
Mitre link : CVE-2019-14837
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
redhat
- single_sign-on
- keycloak