CVE-2019-10157Insufficient Verification of Data Authenticity in Redhat Keycloak

Severity
5.5MEDIUMNVD
CNA4.7
EPSS
0.0%
top 95.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateJun 13

Description

It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDredhat/keycloak< 4.8.3
CVEListV5red_hat/keycloak4.8.3

🔴Vulnerability Details

3
GHSA
Forced Logout in keycloak-connect2019-06-13
OSV
Forced Logout in keycloak-connect2019-06-13
CVEList
CVE-2019-10157: It was found that Keycloak's Node2019-06-12

📋Vendor Advisories

1
Red Hat
keycloak: Node.js adapter internal NBF can be manipulated leading to DoS.2019-06-11

💬Community

1
Bugzilla
CVE-2019-10157 keycloak: Node.js adapter internal NBF can be manipulated leading to DoS.2019-04-25
CVE-2019-10157 — Redhat Keycloak vulnerability | cvebase