6.4
CVSSv2

CVE-2019-14837

Published: 07/01/2020 Updated: 15/01/2020
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat keycloak

redhat single sign-on 7.3

Vendor Advisories

Synopsis Important: Red Hat Single Sign-On 735 security update on RHEL 6 Type/Severity Security Advisory: Important Topic New Red Hat Single Sign-On 735 packages are now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Co ...
Synopsis Important: Red Hat Single Sign-On 735 security update Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 73 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulne ...
Synopsis Important: Red Hat Single Sign-On 735 security update on RHEL 7 Type/Severity Security Advisory: Important Topic New Red Hat Single Sign-On 735 packages are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Co ...
Synopsis Important: Red Hat Single Sign-On 735 security update on RHEL 8 Type/Severity Security Advisory: Important Topic New Red Hat Single Sign-On 735 packages are now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Co ...