First published: Thu Feb 03 2022(Updated: )
Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | <17.0.1 | |
Redhat Single Sign-on | =7.5.0 | |
redhat/keycloak | <17.0.1 | 17.0.1 |
maven/org.keycloak:keycloak-core | <17.0.1 | 17.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Red Hat Single Sign-On is CVE-2022-1466.
The severity of CVE-2022-1466 is medium.
CVE-2022-1466 is a vulnerability in Red Hat Single Sign-On that allows users to perform unauthorized actions.
Versions up to and including 7.5.0 of Red Hat Single Sign-On and versions up to 17.0.1 of Red Hat Keycloak are affected by CVE-2022-1466.
To fix CVE-2022-1466, update Red Hat Single Sign-On to a version higher than 7.5.0 or update Red Hat Keycloak to a version higher than 17.0.1.