CVE Vulnerabilities

CVE-2020-1718

Improper Authentication

Published: May 12, 2020 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Jboss_fuseRedhat7.0.0 (including)7.0.0 (including)
KeycloakRedhat*8.0.0 (excluding)
Openshift_application_runtimesRedhat- (including)- (including)
Red Hat Decision Manager 7RedHatkeycloak*
Red Hat Process Automation 7RedHatkeycloak*
Red Hat Runtimes Spring Boot 2.2.6RedHatkeycloak*
Red Hat Single Sign On 7.3.8RedHat*
Red Hat Single Sign-On 7.3 for RHEL 6RedHatrh-sso7-keycloak-0:4.8.20-1.Final_redhat_00001.1.el6sso*
Red Hat Single Sign-On 7.3 for RHEL 7RedHatrh-sso7-keycloak-0:4.8.20-1.Final_redhat_00001.1.el7sso*
Red Hat Single Sign-On 7.3 for RHEL 8RedHatrh-sso7-keycloak-0:4.8.20-1.Final_redhat_00001.1.el8sso*
Text-Only RHOARRedHat*

Potential Mitigations

References