First published: Wed Nov 14 2018(Updated: )
A flaw was found in keycloak. A keycloak adapter exposes internal endpoints in org.keycloak.constants.AdapterConstantsThe keycloak which can be invoked by appending the appropriate suffix (e.g. k_version) to any URL. This vulnerability might lead to an information exposure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <8.0.0 | 8.0.0 |
redhat/rh-sso7-keycloak | <0:4.8.13-1.Final_redhat_00001.1.el6 | 0:4.8.13-1.Final_redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:4.8.13-1.Final_redhat_00001.1.el7 | 0:4.8.13-1.Final_redhat_00001.1.el7 |
redhat/rh-sso7-libunix-dbus-java | <0:0.8.0-2.el7 | 0:0.8.0-2.el7 |
redhat/rh-sso7-keycloak | <0:4.8.13-1.Final_redhat_00001.1.el8 | 0:4.8.13-1.Final_redhat_00001.1.el8 |
Redhat Keycloak | <8.0.0 | |
Redhat Single Sign-on | =7.3 | |
Redhat Jboss Enterprise Application Platform | =6.4.0 | |
Redhat Jboss Enterprise Application Platform | =7.2.0 | |
Redhat Jboss Fuse | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-14820 is a vulnerability found in Keycloak before version 8.0.0 that exposes internal adapter endpoints.
CVE-2019-14820 has a severity rating of 4.3 (medium).
CVE-2019-14820 can be exploited by invoking specially-crafted URLs to access unauthorized information.
Versions 0:4.8.13-1.Final_redhat_00001.1.el6, 0:4.8.13-1.Final_redhat_00001.1.el7, 0:0.8.0-2.el7, and 0:4.8.13-1.Final_redhat_00001.1.el8 of rh-sso7-keycloak are affected by CVE-2019-14820.
Yes, the fix for CVE-2019-14820 is available in version 8.0.0 of Keycloak.