First published: Mon Aug 30 2021(Updated: )
A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | ||
Redhat Single Sign-on | =7.0 | |
maven/org.keycloak:keycloak-services | <24.0.1 | 24.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3754 is a vulnerability found in Keycloak that allows an attacker to register themselves with the username same as the email ID of an existing user, causing issues with password recovery.
The severity of CVE-2021-3754 is medium, with a CVSSv3 base score of 5.3.
Redhat Keycloak and Redhat Single Sign-on version 7.0 are affected by CVE-2021-3754.
An attacker can exploit CVE-2021-3754 by registering themselves with the same username as the email ID of an existing user.
Yes, you can find more information about CVE-2021-3754 at the following references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1999196) and [Red Hat Security](https://access.redhat.com/security/cve/CVE-2021-3754).