CVE Vulnerabilities

CVE-2020-14302

Authentication Bypass by Capture-replay

Published: Dec 15, 2020 | Modified: Nov 21, 2024
CVSS 3.x
4.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
RedHat/V2
RedHat/V3
3.5 LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keycloak before 13.0.0 where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same state parameter. This flaw allows a malicious user to perform replay attacks.

Weakness

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Affected Software

NameVendorStart VersionEnd Version
KeycloakRedhat*13.0.0 (excluding)
Red Hat Single Sign-On 7.4.6RedHat*
Red Hat Single Sign-On 7.4 for RHEL 6RedHatrh-sso7-keycloak-0:9.0.12-1.redhat_00001.1.el6sso*
Red Hat Single Sign-On 7.4 for RHEL 7RedHatrh-sso7-keycloak-0:9.0.12-1.redhat_00001.1.el7sso*
Red Hat Single Sign-On 7.4 for RHEL 8RedHatrh-sso7-keycloak-0:9.0.12-1.redhat_00001.1.el8sso*

Potential Mitigations

References