Description
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0534 | Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm. |
Github GHSA |
GHSA-778x-2mqv-w6xw | Moderate severity vulnerability that affects org.keycloak:keycloak-core |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T17:52:54.232Z
Reserved: 2016-10-12T00:00:00.000Z
Link: CVE-2016-8629
No data.
Status : Modified
Published: 2018-03-12T15:29:00.210
Modified: 2024-11-21T02:59:43.123
Link: CVE-2016-8629
OpenCVE Enrichment
No data.
EUVD
Github GHSA