It was found that Keycloaks Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keycloak | Redhat | * | 4.8.3 (excluding) |
Single_sign-on | Redhat | * | 7.3.2 (excluding) |
Red Hat Single Sign-On 7.3.2 zip | RedHat | * |