9.8
CVE-2017-7474
- EPSS 1.73%
- Veröffentlicht 12.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.0
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.0 Updatecr1
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.1
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.2
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.3
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.4
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.5
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.6
Keycloak ≫ Keycloak-nodejs-auth-utils Version2.5.7
Keycloak ≫ Keycloak-nodejs-auth-utils Version3.0.0
Keycloak ≫ Keycloak-nodejs-auth-utils Version3.0.0 Updatecr1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.73% | 0.818 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-253 Incorrect Check of Function Return Value
The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional conditions.