CWE
287
Advisory Published
CVE Published
Updated

CVE-2021-3827

First published: Thu Sep 02 2021(Updated: )

A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/keycloak-server-spi-private<18.0.0
18.0.0
redhat/rh-sso7-keycloak<0:15.0.4-1.redhat_00001.1.el7
0:15.0.4-1.redhat_00001.1.el7
redhat/rh-sso7-keycloak<0:15.0.4-1.redhat_00001.1.el8
0:15.0.4-1.redhat_00001.1.el8
redhat/redhat-sso<7-sso75-openshift-rhel8
7-sso75-openshift-rhel8
Redhat Keycloak<18.0.0
Redhat Single Sign-on=7.0
Redhat Single Sign-on=7.5.0
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Openshift Container Platform=4.8
Redhat Openshift Container Platform=4.9
Redhat Enterprise Linux=8.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2021-3827?

    CVE-2021-3827 is a vulnerability found in Keycloak that allows other authentication flows to be bypassed, potentially enabling an attacker to bypass MFA authentication.

  • How does CVE-2021-3827 work?

    CVE-2021-3827 works by exploiting the default ECP binding flow in Keycloak, allowing an attacker to bypass MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header containing the user's credentials.

  • What is the severity of CVE-2021-3827?

    CVE-2021-3827 has a severity rating of 6.8 (medium).

  • Which software versions are affected by CVE-2021-3827?

    Keycloak versions up to and excluding 18.0.0, rh-sso7-keycloak versions 0:15.0.4-1.redhat_00001.1.el7 and 0:15.0.4-1.redhat_00001.1.el8, and redhat-sso version 7-sso75-openshift-rhel8 are affected by CVE-2021-3827.

  • How can I mitigate CVE-2021-3827?

    To mitigate CVE-2021-3827, update your Keycloak and related software to versions that include the necessary fixes. Refer to the provided remediation links for more information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203