CVE-2019-14910 — Improper Authentication in Redhat Keycloak
CWE-287 — Improper AuthenticationCWE-305 — Authentication Bypass by Primary WeaknessCWE-592 — DEPRECATED: Authentication Bypass IssuesCWE-295 — Improper Certificate ValidationCWE-278 — Insecure Preserved Inherited PermissionsCWE-303 — Incorrect Implementation of Authentication Algorithm6 documents6 sources
Severity
9.8CRITICALNVD
EPSS
0.4%
top 38.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 5
Latest updateMay 24
Description
A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
1💬Community
1Bugzilla▶
CVE-2019-14910 Keycloak: LDAP authentication accepts invalid passwords when using StartTLS↗2019-11-29