- Description
- Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6F942D06-B2AA-47F1-B05E-E05EB6CA1191",
"versionEndExcluding": "2.4.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "11FE6021-DBE7-4FFD-B021-F97EF80BDEEA"
},
{
"criteria": "cpe:2.3:a:redhat:single_sign_on:7.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0AB839F9-8CE2-4EAE-90F2-2CA55742957E"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]