CVE Vulnerabilities

CVE-2017-7474

Incorrect Check of Function Return Value

Published: May 12, 2017 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Ubuntu

It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.

Weakness

The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional conditions.

Affected Software

Name Vendor Start Version End Version
Keycloak-nodejs-auth-utils Keycloak 2.5.0 (including) 2.5.0 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.0-cr1 (including) 2.5.0-cr1 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.1 (including) 2.5.1 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.2 (including) 2.5.2 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.3 (including) 2.5.3 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.4 (including) 2.5.4 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.5 (including) 2.5.5 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.6 (including) 2.5.6 (including)
Keycloak-nodejs-auth-utils Keycloak 2.5.7 (including) 2.5.7 (including)
Keycloak-nodejs-auth-utils Keycloak 3.0.0 (including) 3.0.0 (including)
Keycloak-nodejs-auth-utils Keycloak 3.0.0-cr1 (including) 3.0.0-cr1 (including)
Red Hat Single Sign-On 7.1 RedHat *

Potential Mitigations

References