First published: Fri Feb 26 2021(Updated: )
A flaw was found in keycloak as shipped in Red Hat Single Sign-On 7.4 where IDN homograph attacks are possible. A malicious user can register himself with a name already registered and trick admin to grant him extra privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <18.0.0 | 18.0.0 |
redhat/rh-sso7-keycloak | <0:9.0.13-1.redhat_00006.1.el6 | 0:9.0.13-1.redhat_00006.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.13-1.redhat_00006.1.el7 | 0:9.0.13-1.redhat_00006.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.13-1.redhat_00006.1.el8 | 0:9.0.13-1.redhat_00006.1.el8 |
Redhat Single Sign-on | =7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3424 is a vulnerability in Keycloak, as shipped in Red Hat Single Sign-On 7.4, that allows IDN homograph attacks.
The severity of CVE-2021-3424 is medium with a CVSS score of 5.3.
CVE-2021-3424 allows a malicious user to register a name that already exists and trick an admin to grant extra privileges, posing an integrity threat.
To fix CVE-2021-3424, update the affected software to version 18.0.0 for Keycloak or apply the specific security patches provided by Red Hat for Red Hat Single Sign-On 7.4.
You can find more information about CVE-2021-3424 on the CVE website, NIST NVD database, GitHub security advisory, Red Hat Bugzilla, and Red Hat errata page.