CVE-2020-14302 — Authentication Bypass by Capture-replay in Redhat Keycloak
Severity
4.9MEDIUMNVD
EPSS
0.2%
top 63.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 15
Latest updateMay 24
Description
A flaw was found in Keycloak before 13.0.0 where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same "state" parameter. This flaw allows a malicious user to perform replay attacks.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:NExploitability: 1.2 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
keycloak: reusable "state" parameter at redirect_uri endpoint enables possibility of replay attacks↗2020-11-26
💬Community
1Bugzilla▶
CVE-2020-14302 keycloak: reusable "state" parameter at redirect_uri endpoint enables possibility of replay attacks↗2020-06-22