Description
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0509 | It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely. |
Github GHSA |
GHSA-68hw-vfh7-xvg8 | Forced Logout in keycloak-connect |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T22:10:10.057Z
Reserved: 2019-03-27T00:00:00.000Z
Link: CVE-2019-10157
No data.
Status : Modified
Published: 2019-06-12T14:29:02.963
Modified: 2024-11-21T04:18:32.310
Link: CVE-2019-10157
OpenCVE Enrichment
No data.
EUVD
Github GHSA