CVE-2020-1725 — Incorrect Authorization in Redhat Keycloak
Severity
5.4MEDIUMNVD
EPSS
0.1%
top 69.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 28
Latest updateFeb 9
Description
A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
1Red Hat▶
keycloak-gatekeeper: improper usage of parsed claims for authorization leads to improper resource access↗2021-01-19
💬Community
3Bugzilla▶
CVE-2020-1725 keycloak-gatekeeper: improper usage of parsed claims for authorization leads to improper resource access↗2019-10-24