First published: Fri Dec 11 2020(Updated: )
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | <13.0.0 | |
Redhat Single Sign-on | =7.0 | |
redhat/keycloak | <13.0.0 | 13.0.0 |
maven/org.keycloak:keycloak-core | <13.0.0 | 13.0.0 |
<13.0.0 | ||
=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27838 is a vulnerability in Keycloak prior to version 13.0.0 that allows fetching information about PUBLIC clients without authentication.
CVE-2020-27838 allows PUBLIC clients to access client secret information without authentication, which could be a problem if the same PUBLIC client is changed to CONFIDENTIAL later.
CVE-2020-27838 has a severity rating of medium.
To fix CVE-2020-27838, update Keycloak to version 13.0.0 or later.
You can find more information about CVE-2020-27838 at the following references: [reference 1](https://issues.redhat.com/browse/KEYCLOAK-16521) and [reference 2](https://bugzilla.redhat.com/show_bug.cgi?id=1906797).