A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-20262 - Medium Severity Vulnerability
Vulnerable Library - keycloak-core-11.0.0-alfresco-001.jar
Keycloak SSO
Library home page: http://keycloak.org
Path to dependency file: /pom.xml
Path to vulnerable library: /canner/.m2/repository/org/keycloak/keycloak-core/11.0.0-alfresco-001/keycloak-core-11.0.0-alfresco-001.jar
Dependency Hierarchy: - :x: **keycloak-core-11.0.0-alfresco-001.jar** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Publish Date: 2021-03-09
URL: CVE-2021-20262
CVSS 3 Score Details (6.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-20262
Release Date: 2021-03-09
Fix Resolution: 13.0.0
Step up your Open Source Security Game with Mend here