Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1388988 | Issue Tracking |
https://access.redhat.com/errata/RHSA-2017:0873 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2017:0872 | Vendor Advisory |
http://www.securitytracker.com/id/1038180 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/97392 | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2017-0876.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2018-03-12 15:29
Updated : 2019-10-09 23:20
NVD link : CVE-2016-8629
Mitre link : CVE-2016-8629
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- keycloak
- single_sign_on
CWE
CWE-264
Permissions, Privileges, and Access Controls