Redhat

Single Sign-on

103 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 01.04.2022 23:15:10
  • Last modified 21.11.2024 06:21:35

A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].

Exploit
  • EPSS 1.7%
  • Published 11.03.2022 18:15:25
  • Last modified 21.11.2024 06:39:31

A flaw was found in JBoss-client. The vulnerability occurs due to a memory leak on the JBoss client-side, when using UserTransaction repeatedly and leads to information leakage vulnerability.

  • EPSS 72.2%
  • Published 14.12.2021 12:15:12
  • Last modified 21.11.2024 06:36:54

JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppen...

  • EPSS 0.41%
  • Published 09.07.2021 11:15:09
  • Last modified 21.11.2024 06:22:02

A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.

  • EPSS 0.16%
  • Published 01.06.2021 19:15:07
  • Last modified 21.11.2024 06:21:28

A flaw was found in keycloak as shipped in Red Hat Single Sign-On 7.4 where IDN homograph attacks are possible. A malicious user can register himself with a name already registered and trick admin to grant him extra privileges.

  • EPSS 0.17%
  • Published 28.05.2021 11:15:07
  • Last modified 21.11.2024 05:21:53

A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular ...

  • EPSS 0.04%
  • Published 26.05.2021 22:15:07
  • Last modified 21.11.2024 04:55:52

An insecure modification flaw in the /etc/passwd file was found in the redhat-sso-7 container. An attacker with access to the container can use this flaw to modify the /etc/passwd and escalate their privileges.

  • EPSS 0.04%
  • Published 09.03.2021 18:15:15
  • Last modified 21.11.2024 05:46:14

A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from th...

  • EPSS 89.1%
  • Published 08.03.2021 22:15:13
  • Last modified 21.11.2024 05:21:54

A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFI...

  • EPSS 0.18%
  • Published 11.02.2021 18:15:14
  • Last modified 21.11.2024 05:11:13

A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.