CVE-2020-1731 — Predictable from Observable State in Redhat Keycloak Operator
Severity
9.8CRITICALNVD
CNA9.1
EPSS
0.4%
top 39.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 2
Latest updateOct 27
Description
A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
1Red Hat▶
keycloak: generates same admin password while installation when deployed on same openshift namespace↗2020-02-25
💬Community
2Bugzilla▶
CVE-2020-25675 ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c↗2020-10-27
Bugzilla▶
CVE-2020-1731 keycloak: generates same admin password while installation when deployed on same openshift namespace↗2020-02-11