Description
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0707 | Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks. |
Github GHSA |
GHSA-w6gv-3r3v-gwgj | keycloak-core vulnerable to timing attacks against JWS token verification |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T22:56:17.924Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2585
No data.
Status : Modified
Published: 2018-03-12T15:29:00.397
Modified: 2024-11-21T03:23:46.677
Link: CVE-2017-2585
OpenCVE Enrichment
No data.
EUVD
Github GHSA