First published: Thu Dec 05 2019(Updated: )
A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-parent | >=7.0.0<=7.0.1 | |
Redhat Keycloak | =7.0.0 | |
Redhat Keycloak | =7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14910 is a vulnerability in Keycloak 7.x that allows user authentication to succeed even if an invalid password has been entered when Keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps).
The severity of CVE-2019-14910 is critical with a severity value of 9.
CVE-2019-14910 affects Keycloak 7.x when it is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps).
To fix CVE-2019-14910, it is recommended to upgrade Keycloak to a version higher than 7.0.1.
The CWE for CVE-2019-14910 is CWE-278 and CWE-295.