First published: Fri May 08 2020(Updated: )
A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | <8.0.0 | |
maven/org.keycloak:keycloak-authz-client | <8.0.0 | 8.0.0 |
<8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10169 is a vulnerability found in Keycloak's user-managed access interface that allows an authenticated attacker to execute arbitrary code with the permissions of the user running the application.
CVE-2019-10169 has a severity rating of 7.2, which is considered high.
An attacker with UMA permissions can exploit CVE-2019-10169 by configuring a malicious script in the UMA policy, which can trigger and execute arbitrary code.
CVE-2019-10169 affects Redhat Keycloak versions up to exclusive 8.0.0.
Yes, to fix CVE-2019-10169, it is recommended to update Keycloak to a version beyond 8.0.0.