CVE Vulnerabilities

CVE-2017-7474

Incorrect Check of Function Return Value

Published: May 12, 2017 | Modified: Apr 20, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.

Weakness

The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional conditions.

Affected Software

NameVendorStart VersionEnd Version
Keycloak-nodejs-auth-utilsKeycloak2.5.0 (including)2.5.0 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.0-cr1 (including)2.5.0-cr1 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.1 (including)2.5.1 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.2 (including)2.5.2 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.3 (including)2.5.3 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.4 (including)2.5.4 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.5 (including)2.5.5 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.6 (including)2.5.6 (including)
Keycloak-nodejs-auth-utilsKeycloak2.5.7 (including)2.5.7 (including)
Keycloak-nodejs-auth-utilsKeycloak3.0.0 (including)3.0.0 (including)
Keycloak-nodejs-auth-utilsKeycloak3.0.0-cr1 (including)3.0.0-cr1 (including)
Red Hat Single Sign-On 7.1RedHat*

Potential Mitigations

References