Redhat

Single Sign-on

113 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 27.03.2026 16:13:05
  • Zuletzt bearbeitet 10.04.2026 14:22:53

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Go...

  • EPSS 0.05%
  • Veröffentlicht 27.03.2026 16:13:05
  • Zuletzt bearbeitet 31.03.2026 18:08:21

A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates HTTP standards, can...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2026 16:13:03
  • Zuletzt bearbeitet 31.03.2026 18:20:30

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exp...

  • EPSS 0.01%
  • Veröffentlicht 26.03.2026 19:13:26
  • Zuletzt bearbeitet 02.04.2026 14:16:31

A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over rol...

  • EPSS 0.03%
  • Veröffentlicht 26.03.2026 07:12:37
  • Zuletzt bearbeitet 01.04.2026 14:11:28

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `bac...

  • EPSS 0.64%
  • Veröffentlicht 24.03.2026 04:11:16
  • Zuletzt bearbeitet 08.04.2026 19:11:02

A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the ser...

  • EPSS 0.03%
  • Veröffentlicht 18.03.2026 04:02:59
  • Zuletzt bearbeitet 01.04.2026 15:10:12

A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintend...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 18:27:43
  • Zuletzt bearbeitet 24.03.2026 12:16:12

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a prev...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2026 07:30:26
  • Zuletzt bearbeitet 05.03.2026 02:03:32

A flaw was found in Keycloak. An administrator with `manage-users` permission can bypass the "Only administrators can view" setting for unmanaged attributes, allowing them to modify these attributes. This improper access control can lead to unauthori...

  • EPSS 0.05%
  • Veröffentlicht 07.01.2026 16:04:22
  • Zuletzt bearbeitet 18.03.2026 16:16:22

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed ...