logo

CVE-2020-1744 org.keycloak:keycloak-core

Package

Manager: maven
Name: org.keycloak:keycloak-core
Vulnerable Version: >=0 <9.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00333 pctl0.55526

Details

Exposure of Sensitive Information in keycloak A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.

Metadata

Created: 2021-09-20T20:43:24Z
Modified: 2021-09-16T18:21:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-4gf2-xv97-63m2/GHSA-4gf2-xv97-63m2.json
CWE IDs: ["CWE-200", "CWE-755"]
Alternative ID: GHSA-4gf2-xv97-63m2
Finding: F038
Auto approve: 1