First published: Tue May 05 2020(Updated: )
A vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | ||
Redhat Jboss Fuse | =7.0.0 | |
Redhat Openshift Application Runtimes | ||
Redhat Single Sign-on | =7.0 | |
redhat/keycloak | <18.0.0 | 18.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10734 is a vulnerability found in Keycloak that affects versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes.
The severity of CVE-2020-10734 is low, with a severity value of 3.3.
CVE-2020-10734 impacts Keycloak by not having CSRF protection in the OIDC logout endpoint.
CVE-2020-10734 affects Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes.
To mitigate CVE-2020-10734, update to version 18.0.0 or later of Keycloak.