RSS   Vulnerabilities for 'Single sign-on'   RSS

2022-04-18
 
CVE-2021-20324

CWE-384
 

 
A flaw was found in WildFly Elytron. A variation to the use of a session fixation exploit when using Undertow was found despite Undertow switching the session ID after authentication.

 
2022-03-11
 
CVE-2022-0853

CWE-401
 

 
A flaw was found in JBoss-client. The vulnerability occurs due to a memory leak on the JBoss client-side, when using UserTransaction repeatedly and leads to information leakage vulnerability.

 
2021-12-14
 
CVE-2021-4104

CWE-502
 

 
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

 
2021-07-09
 
CVE-2021-3637

CWE-770
 

 
A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.

 
2021-05-28
 
CVE-2020-27826

CWE-250
 

 
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.

 
2021-05-26
 
CVE-2020-10695

CWE-266
 

 
An insecure modification flaw in the /etc/passwd file was found in the redhat-sso-7 container. An attacker with access to the container can use this flaw to modify the /etc/passwd and escalate their privileges.

 
2021-03-09
 
CVE-2021-20262

CWE-306
 

 
A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user�??s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

 
2021-03-08
 
CVE-2020-27838

CWE-287
 

 
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.

 
2021-02-11
 
CVE-2020-1717

CWE-209
 

 
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.

 
2021-01-12
 
CVE-2020-14341

CWE-385
 

 
The "Test Connection" available in v7.x of the Red Hat Single Sign On application console can permit an authorized user to cause SMTP connections to be attempted to arbitrary hosts and ports of the user's choosing, and originating from the RHSSO installation. By observing differences in the timings of these scans, an attacker may glean information about hosts and ports which they do not have access to scan directly.

 


Copyright 2024, cxsecurity.com

 

Back to Top