First published: Thu Sep 05 2019(Updated: )
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-model-jpa | <7.0.1 | 7.0.1 |
maven/org.keycloak:keycloak-model-infinispan | <7.0.1 | 7.0.1 |
Redhat Keycloak | <7.0.1 | |
redhat/rh-sso7-keycloak | <0:4.8.13-1.Final_redhat_00001.1.el6 | 0:4.8.13-1.Final_redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:4.8.13-1.Final_redhat_00001.1.el7 | 0:4.8.13-1.Final_redhat_00001.1.el7 |
redhat/rh-sso7-libunix-dbus-java | <0:0.8.0-2.el7 | 0:0.8.0-2.el7 |
redhat/rh-sso7-keycloak | <0:4.8.13-1.Final_redhat_00001.1.el8 | 0:4.8.13-1.Final_redhat_00001.1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-14832 is a vulnerability in the Keycloak REST API that allows unauthorized access to user information.
CVE-2019-14832 has a severity rating of 7.5 (high).
CVE-2019-14832 allows an authenticated attacker with knowledge of a user id to access unauthorized information or carry out unauthorized actions.
To fix the CVE-2019-14832 vulnerability, update Keycloak to version 7.0.1 or later.
Yes, you can refer to the following links for more information on CVE-2019-14832: [Reference 1](https://access.redhat.com/errata/RHSA-2019:3044), [Reference 2](https://access.redhat.com/errata/RHSA-2019:3045), [Reference 3](https://access.redhat.com/errata/RHSA-2019:3046).