CVE-2020-1725
- EPSS 0.12%
- Veröffentlicht 28.01.2021 20:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:14
A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.
CVE-2020-14302
- EPSS 0.15%
- Veröffentlicht 15.12.2020 20:15:15
- Zuletzt bearbeitet 21.11.2024 05:02:57
A flaw was found in Keycloak before 13.0.0 where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same "state" parameter. This flaw allows a malicio...
CVE-2020-10770
- EPSS 92.28%
- Veröffentlicht 15.12.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 04:56:02
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF...
CVE-2020-14389
- EPSS 0.15%
- Veröffentlicht 17.11.2020 02:15:13
- Zuletzt bearbeitet 21.11.2024 05:03:09
It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.
CVE-2020-10776
- EPSS 0.27%
- Veröffentlicht 17.11.2020 02:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:02
A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.
CVE-2020-14366
- EPSS 0.38%
- Veröffentlicht 09.11.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:03:06
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can ...
CVE-2020-1694
- EPSS 0.28%
- Veröffentlicht 16.09.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:11
A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions.
CVE-2020-10748
- EPSS 0.27%
- Veröffentlicht 16.09.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 04:55:59
A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks.
CVE-2020-10758
- EPSS 0.53%
- Veröffentlicht 16.09.2020 16:15:14
- Zuletzt bearbeitet 21.11.2024 04:56:00
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body...
CVE-2020-1727
- EPSS 0.18%
- Veröffentlicht 22.06.2020 19:15:10
- Zuletzt bearbeitet 21.11.2024 05:11:15
A vulnerability was found in Keycloak before 9.0.2, where every Authorization URL that points to an IDP server lacks proper input validation as it allows a wide range of characters. This flaw allows a malicious to craft deep links that introduce furt...