- Description
- Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-200
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E2C6178C-0196-42C2-9947-777F4F397D9D",
"versionEndExcluding": "2.5.1"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "11FE6021-DBE7-4FFD-B021-F97EF80BDEEA"
},
{
"criteria": "cpe:2.3:a:redhat:single_sign_on:7.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0AB839F9-8CE2-4EAE-90F2-2CA55742957E"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]