Description
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
Published: 2019-06-12
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0509 It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
Github GHSA Github GHSA GHSA-68hw-vfh7-xvg8 Forced Logout in keycloak-connect
History

No history.

Subscriptions

Redhat Jboss Single Sign On Keycloak Single Sign-on
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T22:10:10.057Z

Reserved: 2019-03-27T00:00:00.000Z

Link: CVE-2019-10157

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-12T14:29:02.963

Modified: 2024-11-21T04:18:32.310

Link: CVE-2019-10157

cve-icon Redhat

Severity : Low

Publid Date: 2019-06-11T14:23:00Z

Links: CVE-2019-10157 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses