A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keycloak | Redhat | * | 8.0.0 (excluding) |
Red Hat Single Sign-On 7.3.4 zip | RedHat | * |