CVE-2017-7474 – keycloak-connect
Package
Manager: npm
Name: keycloak-connect
Vulnerable Version: >=2.5.0 <3.1.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00128 pctl0.33035
Details
keycloak-connect and keycloak-js improperly handle invalid tokens It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
Metadata
Created: 2017-11-15T20:41:51Z
Modified: 2023-09-08T19:56:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/11/GHSA-mw35-24gh-f82w/GHSA-mw35-24gh-f82w.json
CWE IDs: ["CWE-253"]
Alternative ID: GHSA-mw35-24gh-f82w
Finding: F184
Auto approve: 1