First published: Tue May 05 2020(Updated: )
A vulnerability was found in keycloak in the way that the OIDC logout endpoint do not have CSRF protection. Reference: <a href="https://issues.redhat.com/browse/KEYCLOAK-13653">https://issues.redhat.com/browse/KEYCLOAK-13653</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <18.0.0 | 18.0.0 |
Redhat Keycloak | ||
Redhat Jboss Fuse | =7.0.0 | |
Red Hat Openshift Application Runtimes | ||
Red Hat Single Sign-On | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10734 is a vulnerability found in Keycloak that affects versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes.
The severity of CVE-2020-10734 is low, with a severity value of 3.3.
CVE-2020-10734 impacts Keycloak by not having CSRF protection in the OIDC logout endpoint.
CVE-2020-10734 affects Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes.
To mitigate CVE-2020-10734, update to version 18.0.0 or later of Keycloak.