First published: Tue Mar 19 2019(Updated: )
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloack | <7.0.0 | 7.0.0 |
Redhat Keycloak | <6.0.2 | |
Redhat Single Sign-on | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-3875 is a vulnerability found in Keycloak before version 6.0.2.
CVE-2019-3875 has a severity rating of 6.5 (Medium).
CVE-2019-3875 affects Keycloak versions before 6.0.2 and the X.509 authenticator component.
To fix CVE-2019-3875, upgrade Keycloak to version 6.0.2 or higher.
You can find more information about CVE-2019-3875 at the following references: [link1](https://issues.jboss.org/browse/KEYCLOAK-9846), [link2](https://github.com/keycloak/keycloak/commit/996389d61b1996ac6fe2ce2264fba0616f006055), [link3](https://github.com/keycloak/keycloak/commit/a48698caa32933458916980ab05256f56099a337).