First published: Tue Aug 22 2017(Updated: )
It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible information disclosure or further attacks.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-parent | <3.4.0 | 3.4.0 |
redhat/Keycloak | <3.3.0. | 3.3.0. |
redhat/Keycloak | <3.4.0. | 3.4.0. |
Red Hat Single Sign-On | =7.0 | |
Red Hat Single Sign-On | =7.1 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
Red Hat Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12159 has a medium severity rating due to its potential for information disclosure and unauthorized access to authenticated user sessions.
To fix CVE-2017-12159, update Keycloak to a version greater than 3.4.0 or to 3.3.0 for Red Hat's Keycloak.
CVE-2017-12159 affects Keycloak versions up to 3.4.0 and Red Hat Single Sign-On versions up to 7.1.
An attacker can exploit CVE-2017-12159 to hijack an authenticated user session using the non-unique CSRF prevention cookie.
CVE-2017-12159 is not directly relevant to Red Hat Enterprise Linux as it specifically pertains to Keycloak and related software.