First published: Tue Oct 21 2014(Updated: )
It was discovered that the org.keycloak.services.resources.SocialResource.callback(String) method implementation lacked CSRF protection. A remote attacker could use this flaw to gain access to a KeyCloak managed accounts or perform other attacks.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | <1.0.3.Final | 1.0.3.Final |
redhat/keycloak | <1.0.3. | 1.0.3. |
Red Hat Keycloak | <=1.0.2.final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3709 is considered to have a medium severity due to its potential for CSRF attacks on Keycloak managed accounts.
To fix CVE-2014-3709, upgrade to Keycloak version 1.0.3.Final or later.
CVE-2014-3709 is a Cross-Site Request Forgery (CSRF) vulnerability.
CVE-2014-3709 affects Keycloak versions up to 1.0.2.Final.
An attacker exploiting CVE-2014-3709 could gain unauthorized access to Keycloak managed accounts.