CVE-2020-1744 – org.keycloak:keycloak-core
Package
Manager: maven
Name: org.keycloak:keycloak-core
Vulnerable Version: >=0 <9.0.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00333 pctl0.55526
Details
Exposure of Sensitive Information in keycloak A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
Metadata
Created: 2021-09-20T20:43:24Z
Modified: 2021-09-16T18:21:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-4gf2-xv97-63m2/GHSA-4gf2-xv97-63m2.json
CWE IDs: ["CWE-200", "CWE-755"]
Alternative ID: GHSA-4gf2-xv97-63m2
Finding: F038
Auto approve: 1