CVE-2020-14302Authentication Bypass by Capture-replay in Redhat Keycloak

Severity
4.9MEDIUMNVD
EPSS
0.2%
top 63.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 15
Latest updateMay 24

Description

A flaw was found in Keycloak before 13.0.0 where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same "state" parameter. This flaw allows a malicious user to perform replay attacks.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:NExploitability: 1.2 | Impact: 3.6

Affected Packages2 packages

NVDredhat/keycloak< 13.0.0
CVEListV5redhat/keycloakkeycloak 13.0.0

🔴Vulnerability Details

2
GHSA
GHSA-74gp-x82w-5v28: A flaw was found in Keycloak before 132022-05-24
CVEList
CVE-2020-14302: A flaw was found in Keycloak before 132020-12-15

📋Vendor Advisories

1
Red Hat
keycloak: reusable "state" parameter at redirect_uri endpoint enables possibility of replay attacks2020-11-26

💬Community

1
Bugzilla
CVE-2020-14302 keycloak: reusable "state" parameter at redirect_uri endpoint enables possibility of replay attacks2020-06-22