Description
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0558 | It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks. |
Github GHSA |
GHSA-959q-32g8-vvp7 | Moderate severity vulnerability that affects org.keycloak:keycloak-core |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T18:28:16.559Z
Reserved: 2017-08-01T00:00:00.000Z
Link: CVE-2017-12161
No data.
Status : Modified
Published: 2018-02-21T18:29:00.213
Modified: 2024-11-21T03:08:57.533
Link: CVE-2017-12161
OpenCVE Enrichment
No data.
EUVD
Github GHSA