A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keycloak | Redhat | * | 8.0.0 (excluding) |