First published: Mon Mar 22 2021(Updated: )
A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:9.0.13-1.redhat_00006.1.el6 | 0:9.0.13-1.redhat_00006.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.13-1.redhat_00006.1.el7 | 0:9.0.13-1.redhat_00006.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.13-1.redhat_00006.1.el8 | 0:9.0.13-1.redhat_00006.1.el8 |
redhat/rh-sso7-keycloak | <9.0.13 | 9.0.13 |
Redhat Keycloak | =9.0.13 | |
Redhat Single Sign-on | =7.0 | |
Redhat Single Sign-on | =7.4 | |
Redhat Single Sign-on | =7.4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3461 is a vulnerability found in Keycloak that may fail to logout user session if the logout request comes from an external SAML identity provider and Principal Type is set to Attribute [Name].
The severity of CVE-2021-3461 is high with a severity value of 7.1.
Keycloak versions up to and excluding 9.0.13 are affected by CVE-2021-3461.
To fix CVE-2021-3461, update to Keycloak version 9.0.13 or higher.
You can find more information about CVE-2021-3461 in the following references: - [CVE-2021-3461](https://www.cve.org/CVERecord?id=CVE-2021-3461) - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-3461) - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1941565) - [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2021:2070)