First published: Tue Apr 25 2017(Updated: )
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <3.1.0 | 3.1.0 |
Keycloak Keycloak-nodejs-auth-utils | =2.5.0 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.0-cr1 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.1 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.2 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.3 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.4 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.5 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.6 | |
Keycloak Keycloak-nodejs-auth-utils | =2.5.7 | |
Keycloak Keycloak-nodejs-auth-utils | =3.0.0 | |
Keycloak Keycloak-nodejs-auth-utils | =3.0.0-cr1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7474 has a medium severity rating due to its potential for authentication bypass.
To fix CVE-2017-7474, upgrade to Keycloak Node.js adapter version 3.1.0 or later.
CVE-2017-7474 affects Keycloak Node.js adapter versions 2.5.0 through 3.0.0.
An attacker could exploit CVE-2017-7474 to bypass authentication and access restricted information.
Yes, CVE-2017-7474 is exploitable in production environments if the affected versions are in use.