Lucene search

K
cveRedhatCVE-2021-3827
HistoryAug 23, 2022 - 4:15 p.m.

CVE-2021-3827

2022-08-2316:15:10
CWE-287
redhat
web.nvd.nist.gov
2275
5
cve-2021-3827
keycloak
mfa bypass
ecp binding
confidentiality
integrity

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

EPSS

0.002

Percentile

52.1%

A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user’s credentials. The highest threat from this vulnerability is to confidentiality and integrity.

Affected configurations

Nvd
Vulners
Node
redhatkeycloakRange<18.0.0
OR
redhatsingle_sign-onMatch7.0
Node
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch8.0-
AND
redhatsingle_sign-onMatch7.5.0
Node
redhatenterprise_linuxMatch8.0
AND
redhatopenshift_container_platformMatch4.8
OR
redhatopenshift_container_platformMatch4.9
VendorProductVersionCPE
redhatkeycloak*cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
redhatsingle_sign-on7.0cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
redhatenterprise_linux7.0cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*
redhatsingle_sign-on7.5.0cpe:2.3:a:redhat:single_sign-on:7.5.0:*:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhatopenshift_container_platform4.8cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*
redhatopenshift_container_platform4.9cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "keycloak",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Fixed in v18.0.0"
      }
    ]
  }
]

Social References

More

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

EPSS

0.002

Percentile

52.1%