First published: Mon Jan 04 2021(Updated: )
A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el6 | 0:9.0.15-1.redhat_00002.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el7 | 0:9.0.15-1.redhat_00002.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.15-1.redhat_00002.1.el8 | 0:9.0.15-1.redhat_00002.1.el8 |
Redhat Keycloak | =11.0.3 | |
Redhat Keycloak | =12.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw in Keycloak is CVE-2020-35509.
The severity of CVE-2020-35509 is medium.
Versions 11.0.3 and 12.0.0 of Keycloak are affected by CVE-2020-35509.
The highest threat from CVE-2020-35509 is to data confidentiality and integrity.
To fix the vulnerability CVE-2020-35509 in Keycloak, update to version 9.0.15-1.redhat_00002.1.el6, 9.0.15-1.redhat_00002.1.el7, or 9.0.15-1.redhat_00002.1.el8.