CVE-2020-1731Predictable from Observable State in Redhat Keycloak Operator

Severity
9.8CRITICALNVD
CNA9.1
EPSS
0.4%
top 39.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 2
Latest updateOct 27

Description

A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5red_hat/keycloakall versions of keycloak operator before keycloak operator 8.0.2

🔴Vulnerability Details

3
GHSA
Predictable password in Keycloak2020-04-15
OSV
Predictable password in Keycloak2020-04-15
CVEList
CVE-2020-1731: A flaw was found in all versions of the Keycloak operator, before version 82020-03-02

📋Vendor Advisories

1
Red Hat
keycloak: generates same admin password while installation when deployed on same openshift namespace2020-02-25

💬Community

2
Bugzilla
CVE-2020-25675 ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/transform.c and MagickCore/image.c2020-10-27
Bugzilla
CVE-2020-1731 keycloak: generates same admin password while installation when deployed on same openshift namespace2020-02-11
CVE-2020-1731 — Predictable from Observable State | cvebase