CVE-2020-14302
A flaw was found in Keycloak before 13.0.0 where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same "state" parameter. This flaw allows a malicious user to perform replay attacks.
Published
2020-12-15T20:15:15.573
Last Modified
2024-11-21T05:02:57.717
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 4.9 (MEDIUM)
CVSSv2 Vector
AV:N/AC:L/Au:S/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: SINGLE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
8.0
Impact Score
2.9
Weaknesses
-
Type: Secondary
CWE-294
-
Type: Primary
CWE-294
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
redhat
|
keycloak
|
< 13.0.0 |
Yes
|
References