It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
2019-06-12T14:29:02.963
2024-11-21T04:18:32.310
Modified
CVSSv3.0: 4.7 (MEDIUM)
AV:L/AC:L/Au:N/C:N/I:N/A:P
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | keycloak | < 4.8.3 | Yes |
Application | redhat | single_sign-on | < 7.3.2 | Yes |