CVE Vulnerabilities

CVE-2020-1744

Improper Handling of Exceptional Conditions

Published: Mar 24, 2020 | Modified: Sep 14, 2021
CVSS 3.x
5.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
5.6 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu

A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.

Weakness

The software does not handle or incorrectly handles an exceptional condition.

Affected Software

Name Vendor Start Version End Version
Keycloak Redhat * *
Red Hat OpenShift Application Runtimes 1.0 RedHat keycloak *
Red Hat OpenShift Application Runtimes 1.0 RedHat keycloak *
Red Hat Single Sign-On 7.3 RedHat keycloak *
Red Hat Single Sign-On 7.3 for RHEL 6 RedHat rh-sso7-keycloak-0:4.8.18-1.Final_redhat_00001.1.el6sso *
Red Hat Single Sign-On 7.3 for RHEL 7 RedHat rh-sso7-keycloak-0:4.8.18-1.Final_redhat_00001.1.el7sso *
Red Hat Single Sign-On 7.3 for RHEL 8 RedHat rh-sso7-keycloak-0:4.8.18-1.Final_redhat_00001.1.el8sso *

References