It was found that Keycloaks Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keycloak | Redhat | * | 4.8.3 (excluding) |
Single_sign-on | Redhat | * | 7.3.2 (excluding) |
Red Hat Single Sign-On 7.3.2 zip | RedHat | * |