First published: Thu Apr 25 2019(Updated: )
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak-nodejs-connect | <4.8.3 | 4.8.3 |
Red Hat Keycloak | <4.8.3 | |
redhat single sign-on | <7.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10157 is considered a medium severity vulnerability due to potential unauthorized access to user sessions.
To fix CVE-2019-10157, update the keycloak-nodejs-connect package to version 4.8.3 or later.
CVE-2019-10157 affects Keycloak's Node.js adapter versions prior to 4.8.3.
An attacker with local access could potentially craft a malicious web token to disrupt user access.
There is no specific workaround for CVE-2019-10157; upgrading to the fixed version is recommended.