Vulnerability Name: | CVE-2020-1714 (CCN-181972) | ||||||||||||
Assigned: | 2019-05-03 | ||||||||||||
Published: | 2019-05-03 | ||||||||||||
Updated: | 2021-10-19 | ||||||||||||
Summary: | A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-1714 Source: CCN Type: Red Hat Bugzilla Bug 1705975 (CVE-2020-1714) - CVE-2020-1714 keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1714 Source: XF Type: UNKNOWN redhat-cve20201714-code-exec(181972) Source: CCN Type: Keycloak GIT Repository Keycloak Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/keycloak/keycloak/pull/7053 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||
BACK |