Lucene search

K

Build Of Keycloak Security Vulnerabilities

cve
cve

CVE-2024-4629

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This ...

6.5CVSS

7.2AI Score

0.001EPSS

2024-09-03 08:15 PM
49
cve
cve

CVE-2024-7260

An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believing that the URL is safe, when, in fact, it ...

6.1CVSS

4.7AI Score

0.001EPSS

2024-09-09 07:15 PM
27
cve
cve

CVE-2024-7318

A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute.A one time passcod...

8.1CVSS

5.2AI Score

0.001EPSS

2024-09-09 07:15 PM
25
cve
cve

CVE-2024-7341

A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication...

8.1CVSS

6.9AI Score

0.002EPSS

2024-09-09 07:15 PM
46
cve
cve

CVE-2024-7885

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the sa...

7.5CVSS

7.4AI Score

0.001EPSS

2024-08-21 02:15 PM
78
cve
cve

CVE-2024-8883

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leadi...

6.8CVSS

6.7AI Score

0.005EPSS

2024-09-19 04:15 PM
32