First published: Tue Jul 16 2019(Updated: )
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test' Upstream issue: <a href="https://issues.jboss.org/browse/KEYCLOAK-10780">https://issues.jboss.org/browse/KEYCLOAK-10780</a> Upstream patch: <a href="https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f">https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Keycloak | <8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1730227 is considered critical as it allows unauthorized password resets.
To fix REDHAT-BUG-1730227, upgrade Keycloak to version 8.0.0 or later.
Organizations using Keycloak versions prior to 8.0.0 are affected by REDHAT-BUG-1730227.
The exploit for REDHAT-BUG-1730227 involves using a service account to reset passwords with knowledge of the client name.
There are no reliable workarounds for REDHAT-BUG-1730227; upgrading is the recommended action.