First published: Fri Feb 21 2020(Updated: )
A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:4.8.18-1.Final_redhat_00001.1.el6 | 0:4.8.18-1.Final_redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:4.8.18-1.Final_redhat_00001.1.el7 | 0:4.8.18-1.Final_redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:4.8.18-1.Final_redhat_00001.1.el8 | 0:4.8.18-1.Final_redhat_00001.1.el8 |
Redhat Keycloak | <9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw in Keycloak is CVE-2020-1744.
The severity of CVE-2020-1744 is medium with a severity value of 5.6.
The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
To fix the vulnerability in Keycloak, update to version 9.0.1 or later.
You can find more information about CVE-2020-1744 on the following references: [link1], [link2], [link3].