First published: Mon Dec 07 2020(Updated: )
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <12.0.0 | 12.0.0 |
redhat/rh-sso7-keycloak | <0:9.0.10-1.redhat_00001.1.el6 | 0:9.0.10-1.redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.10-1.redhat_00001.1.el7 | 0:9.0.10-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.10-1.redhat_00001.1.el8 | 0:9.0.10-1.redhat_00001.1.el8 |
Redhat Keycloak | <12.0.0 | |
Redhat Single Sign-on | ||
Redhat Single Sign-on | =7.4 | |
Redhat Single Sign-on | =7.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2020-27826.
The severity of CVE-2020-27826 is medium.
CVE-2020-27826 allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application in Keycloak.
Keycloak versions before 12.0.0 are affected by CVE-2020-27826.
To fix CVE-2020-27826 in Keycloak, you should update to version 12.0.0 or later.