First published: Tue Jul 16 2019(Updated: )
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test' Upstream issue: <a href="https://issues.jboss.org/browse/KEYCLOAK-10780">https://issues.jboss.org/browse/KEYCLOAK-10780</a> Upstream patch: <a href="https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f">https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:4.8.15-1.Final_redhat_00001.1.el6 | 0:4.8.15-1.Final_redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:4.8.15-1.Final_redhat_00001.1.el7 | 0:4.8.15-1.Final_redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:4.8.15-1.Final_redhat_00001.1.el8 | 0:4.8.15-1.Final_redhat_00001.1.el8 |
Redhat Keycloak | <8.0.0 | |
Redhat Single Sign-on | =7.3 | |
maven/org.keycloak:keycloak-core | <8.0.0 | 8.0.0 |
It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID (service_account_name@placeholder.org) to some valid email ID (abc@gmail.com) in the USER_ENTITY table in the RHSSO database used.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)