Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
keycloak keycloak vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2014-3709
The org.keycloak.services.resources.SocialResource.callback method in JBoss KeyCloak prior to 1.0.3.Final allows remote malicious users to conduct cross-site request forgery (CSRF) attacks by leveraging lack of CSRF protection.
Keycloak Keycloak
7.5
CVSSv3
CVE-2014-3651
JBoss KeyCloak prior to 1.0.3.Final allows remote malicious users to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.
Keycloak Keycloak
8.8
CVSSv3
CVE-2017-12161
It was found that keycloak prior to 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information discl...
Keycloak Keycloak
6.1
CVSSv3
CVE-2020-1723
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
Redhat Mobile Application Platform 4.0
Keycloak Gatekeeper Project Keycloak Gatekeeper 6.0.1
Keycloak Gatekeeper Project Keycloak Gatekeeper 7.0.0
5.4
CVSSv3
CVE-2020-35509
A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.
Redhat Keycloak 12.0.0
Redhat Keycloak 11.0.3
8.3
CVSSv3
CVE-2019-14909
A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted.
Redhat Keycloak 7.0.0
Redhat Keycloak 7.0.1
9.8
CVSSv3
CVE-2019-14910
A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.
Redhat Keycloak 7.0.0
Redhat Keycloak 7.0.1
4.7
CVSSv3
CVE-2020-10686
A flaw was found in Keycloak version 8.0.2 and 9.0.0, and was fixed in Keycloak version 9.0.1, where a malicious user registers as oneself. The attacker could then use the remove devices form to post different credential IDs and possibly remove MFA devices for other users.
Redhat Keycloak 9.0.0
Redhat Keycloak 8.0.2
5.4
CVSSv3
CVE-2017-12158
It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
Redhat Single Sign On 7.0
Redhat Single Sign On 7.1
Keycloak Keycloak -
5.5
CVSSv3
CVE-2017-15111
keycloak-httpd-client-install versions prior to 0.8 insecurely creates temporary file allowing local malicious users to overwrite other files via symbolic link.
Keycloak-httpd-client-install Project Keycloak-httpd-client-install
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »