First published: Thu Sep 02 2021(Updated: )
A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak-server-spi-private | <18.0.0 | 18.0.0 |
redhat/rh-sso7-keycloak | <0:15.0.4-1.redhat_00001.1.el7 | 0:15.0.4-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:15.0.4-1.redhat_00001.1.el8 | 0:15.0.4-1.redhat_00001.1.el8 |
redhat/redhat-sso | <7-sso75-openshift-rhel8 | 7-sso75-openshift-rhel8 |
Redhat Keycloak | <18.0.0 | |
Redhat Single Sign-on | =7.0 | |
Redhat Single Sign-on | =7.5.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Openshift Container Platform | =4.8 | |
Redhat Openshift Container Platform | =4.9 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3827 is a vulnerability found in Keycloak that allows other authentication flows to be bypassed, potentially enabling an attacker to bypass MFA authentication.
CVE-2021-3827 works by exploiting the default ECP binding flow in Keycloak, allowing an attacker to bypass MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header containing the user's credentials.
CVE-2021-3827 has a severity rating of 6.8 (medium).
Keycloak versions up to and excluding 18.0.0, rh-sso7-keycloak versions 0:15.0.4-1.redhat_00001.1.el7 and 0:15.0.4-1.redhat_00001.1.el8, and redhat-sso version 7-sso75-openshift-rhel8 are affected by CVE-2021-3827.
To mitigate CVE-2021-3827, update your Keycloak and related software to versions that include the necessary fixes. Refer to the provided remediation links for more information.