Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2024-7885

Disclosure Date: August 21, 2024 (last updated December 12, 2024)
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.
Attacker Value
Unknown

CVE-2020-10734

Disclosure Date: February 11, 2021 (last updated February 22, 2025)
A vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable.
Attacker Value
Unknown

CVE-2020-1717

Disclosure Date: February 11, 2021 (last updated February 22, 2025)
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.
Attacker Value
Unknown

CVE-2020-1723

Disclosure Date: January 28, 2021 (last updated February 22, 2025)
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
Attacker Value
Unknown

CVE-2020-1714

Disclosure Date: May 13, 2020 (last updated February 21, 2025)
A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
Attacker Value
Unknown

CVE-2020-1718

Disclosure Date: May 12, 2020 (last updated February 21, 2025)
A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.
Attacker Value
Unknown

CVE-2019-14820

Disclosure Date: January 08, 2020 (last updated February 21, 2025)
It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.
Attacker Value
Unknown

CVE-2019-14910

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.
Attacker Value
Unknown

CVE-2019-14909

Disclosure Date: December 04, 2019 (last updated November 27, 2024)
A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted.
Attacker Value
Unknown

CVE-2017-2582

Disclosure Date: July 26, 2018 (last updated November 27, 2024)
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
0