First published: Wed Nov 27 2019(Updated: )
A flaw was found in Keycloak’s Admin Console, where it is missing HTTP security headers in HTTP responses. This issue is not a direct vulnerability and may not lead to a security issue, but increases the chances of allowing attackers to exploit other security flaws. Examples of these possible exploits are servers being prone to clickjacking, channel downgrade attacks, and other similar client-based attack vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | <10.0.0 | |
Quarkus Quarkus | <=1.4.2 | |
redhat/rh-sso7-keycloak | <0:9.0.5-1.redhat_00001.1.el6 | 0:9.0.5-1.redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.5-1.redhat_00001.1.el7 | 0:9.0.5-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.5-1.redhat_00001.1.el8 | 0:9.0.5-1.redhat_00001.1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-1728 is a vulnerability found in all versions of Keycloak where the pages on the Admin Console area of the application are missing general HTTP security headers in HTTP responses.
CVE-2020-1728 has a severity level of medium.
CVE-2020-1728 does not directly lead to a security issue, but it might aid attackers in their efforts to exploit other vulnerabilities.
CVE-2020-1728 affects all versions of Keycloak up to but not including version 10.0.0.
Yes, updating Keycloak to version 10.0.0 or later will address the CVE-2020-1728 vulnerability.