Vulnerability Name: | CVE-2019-3875 (CCN-162515) | ||||||||||||
Assigned: | 2019-03-19 | ||||||||||||
Published: | 2019-03-19 | ||||||||||||
Updated: | 2019-10-09 | ||||||||||||
Summary: | A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle. | ||||||||||||
CVSS v3 Severity: | 4.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) 4.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-295 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-3875 Source: BID Type: Third Party Advisory, VDB Entry 108748 Source: CCN Type: Red Hat Bugzilla Bug 1690628 (CVE-2019-3875) - CVE-2019-3875 keycloak: missing signatures validation on CRL used to verify client certificates Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875 Source: XF Type: UNKNOWN keycloak-cve20193875-mitm(162515) Source: CCN Type: keycloak GIT Repository KEYCLOAK-9512 Run x509 tests by default · keycloak/keycloak@996389d · GitHub | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |