First published: Wed Aug 23 2017(Updated: )
<a href="https://issues.jboss.org/browse/KEYCLOAK-5299">https://issues.jboss.org/browse/KEYCLOAK-5299</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Keycloak | <3.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12161 is considered to have a medium severity due to the potential for URL spoofing in password reset requests.
CVE-2017-12161 affects Keycloak versions prior to 3.4.2 final.
To fix CVE-2017-12161, update Keycloak to version 3.4.2 final or later.
CVE-2017-12161 enables an attacker to spoof URLs in password reset requests using a misconfigured client-side /etc/hosts entry.
There are no official workarounds for CVE-2017-12161, so updating Keycloak is the recommended solution.