First published: Fri Jan 31 2020(Updated: )
A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:4.8.20-1.Final_redhat_00001.1.el6 | 0:4.8.20-1.Final_redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:4.8.20-1.Final_redhat_00001.1.el7 | 0:4.8.20-1.Final_redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:4.8.20-1.Final_redhat_00001.1.el8 | 0:4.8.20-1.Final_redhat_00001.1.el8 |
Redhat Jboss Fuse | =7.0.0 | |
Redhat Keycloak | <8.0.0 | |
Redhat Openshift Application Runtimes |
Disable reset credential flow.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-1718 is a vulnerability found in Keycloak that allows an attacker to gain unauthorized access to the application.
CVE-2020-1718 has a severity rating of 8.8 (high).
All versions of Keycloak before 8.0.0 are affected by CVE-2020-1718.
Upgrade Keycloak to version 8.0.0 or later to fix the vulnerability.
You can find more information about CVE-2020-1718 at the following references: [CVE-2020-1718](https://www.cve.org/CVERecord?id=CVE-2020-1718), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-1718), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1796756), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2020:3196).