First published: Wed Oct 26 2016(Updated: )
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <2.4.0 | 2.4.0 |
Red Hat Keycloak | <2.4.0 | |
Red Hat Single Sign-On | =7.1 | |
Red Hat Single Sign-On | =7.2 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8629 is rated as a high severity vulnerability due to its potential for unauthorized user deletion.
To fix CVE-2016-8629, upgrade Red Hat Keycloak to version 2.4.0 or later.
CVE-2016-8629 affects Red Hat Keycloak versions before 2.4.0 and Red Hat Single Sign-On versions 7.1 and 7.2.
Yes, CVE-2016-8629 can be exploited remotely by an attacker with service account authentication.
Exploiting CVE-2016-8629 allows an attacker to bypass permissions and delete users across different realms.