8.1
CVSSv3

CVE-2018-14637

Published: 30/11/2018 Updated: 09/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat keycloak

Vendor Advisories

Synopsis Moderate: Red Hat Single Sign-On 725 security and bug fix update Type/Severity Security Advisory: Moderate Topic A security update is now available for Red Hat Single Sign-On 72 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Moderate A Com ...
Synopsis Moderate: Red Hat Single Sign-On 725 on RHEL 6 security and bug fix update Type/Severity Security Advisory: Moderate Topic New Red Hat Single Sign-On 725 packages are now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moder ...
Synopsis Moderate: Red Hat Single Sign-On 725 on RHEL 7 security and bug fix update Type/Severity Security Advisory: Moderate Topic New Red Hat Single Sign-On 725 packages are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moder ...
The SAML broker consumer endpoint in Keycloak before version 460Final ignores expiration conditions on SAML assertions An attacker can exploit this vulnerability to perform a replay attack ...