First published: Fri Feb 07 2020(Updated: )
A flaw was found in Keycloak in versions before 9.0.2. This flaw allows a malicious user that is currently logged in, to see the personal information of a previously logged out user in the account manager section.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | <9.0.2 | |
Redhat Openshift Application Runtimes | ||
Redhat Single Sign-on | =7.0 | |
redhat/keycloak | <9.0.2 | 9.0.2 |
maven/org.keycloak:keycloak-core | <9.0.2 | 9.0.2 |
<9.0.2 | ||
=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1724 is a vulnerability found in Keycloak versions before 9.0.2 that allows a malicious user to view the personal information of a previously logged-out user.
CVE-2020-1724 has a severity rating of 4.3, which is considered medium.
To fix CVE-2020-1724, you need to upgrade your Keycloak installation to version 9.0.2 or later.
You can find more information about CVE-2020-1724 in the official Red Hat Security Advisory RHSA-2020:2107 and RHSA-2020:2106.
The CWE for CVE-2020-1724 is CWE-613, which is a design flaw vulnerability.