First published: Thu Dec 16 2021(Updated: )
A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | >=12.0.0<15.1.1 | |
redhat/rh-sso7-keycloak | <0:15.0.2-3.redhat_00002.1.el7 | 0:15.0.2-3.redhat_00002.1.el7 |
redhat/rh-sso7-keycloak | <0:15.0.4-1.redhat_00001.1.el7 | 0:15.0.4-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:15.0.2-3.redhat_00002.1.el8 | 0:15.0.2-3.redhat_00002.1.el8 |
redhat/rh-sso7-keycloak | <0:15.0.4-1.redhat_00001.1.el8 | 0:15.0.4-1.redhat_00001.1.el8 |
redhat/redhat-sso | <7-sso75-openshift-rhel8 | 7-sso75-openshift-rhel8 |
Access to the user-creation functionality in the REST endpoint can be deactivated using CLI commands in undertow. run: bin/jboss-cli.sh --connect /subsystem=undertow/configuration=filter/expression-filter=keycloakPathOverrideUsersCreateEndpoint:add( \ expression="(regex('^/auth/admin/realms/(.*)/users$') and method(POST))-> response-code(400)" \ ) /subsystem=undertow/server=default-server/host=default-host/filter-ref=keycloakPathOverrideUsersCreateEndpoint:add()
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-4133 is a vulnerability found in Keycloak versions from 12.0.0 and before 15.1.1.
The severity of CVE-2021-4133 is high with a CVSS score of 8.3.
CVE-2021-4133 allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
To fix CVE-2021-4133, it is recommended to upgrade Keycloak to version 15.1.1 or above.
You can find more information about CVE-2021-4133 on the Red Hat Security Advisory RHSA-2021:5217 and RHSA-2021:5219.