CVE Vulnerabilities

CVE-2020-1744

Improper Handling of Exceptional Conditions

Published: Mar 24, 2020 | Modified: Nov 07, 2023
CVSS 3.x
5.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
5.6 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu

A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

Name Vendor Start Version End Version
Keycloak Redhat * 9.0.1 (excluding)
Red Hat Runtimes Spring Boot 2.2.6 RedHat keycloak *
Red Hat Single Sign-On 7.3 RedHat *
Red Hat Single Sign-On 7.3 for RHEL 6 RedHat rh-sso7-keycloak-0:4.8.18-1.Final_redhat_00001.1.el6sso *
Red Hat Single Sign-On 7.3 for RHEL 7 RedHat rh-sso7-keycloak-0:4.8.18-1.Final_redhat_00001.1.el7sso *
Red Hat Single Sign-On 7.3 for RHEL 8 RedHat rh-sso7-keycloak-0:4.8.18-1.Final_redhat_00001.1.el8sso *
Text-Only RHOAR RedHat *

References