CVE-2019-10169Privilege Defined With Unsafe Actions in Redhat Keycloak

Severity
7.2HIGHNVD
CNA6.6
EPSS
0.6%
top 30.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 8
Latest updateMay 24

Description

A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages1 packages

NVDredhat/keycloak< 8.0.0

🔴Vulnerability Details

3
GHSA
Keycloak code execution via UMA policy abuse2022-05-24
OSV
Keycloak code execution via UMA policy abuse2022-05-24
CVEList
CVE-2019-10169: A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy2020-05-08

📋Vendor Advisories

1
Red Hat
keycloak: script execution via UMA policy trigger2020-04-30

💬Community

1
Bugzilla
CVE-2019-10169 keycloak: script execution via UMA policy trigger2019-06-17
CVE-2019-10169 — Privilege Defined With Unsafe Actions | cvebase