First published: Fri Feb 07 2020(Updated: )
A flaw was found in Keycloak, where every Authorization URL that points to an IDP server lacks proper input validation as it allows a wide range of characters. This flaw allows a malicious to craft deep links that introduce further attack scenarios on affected clients.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <9.0.2 | 9.0.2 |
Redhat Keycloak | <9.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this flaw is CVE-2020-1727.
Keycloak versions before 9.0.2 are affected by this vulnerability.
The severity of CVE-2020-1727 is medium.
CVE-2020-1727 allows a malicious actor to craft deep links that introduce further attack scenarios on affected clients by exploiting improper input validation in the Authorization URLs.
To fix the CVE-2020-1727 vulnerability, upgrade Keycloak to version 9.0.2 or later.