A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0491 A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
Github GHSA Github GHSA GHSA-38cg-gg9j-q9j9 Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T19:19:18.609Z

Reserved: 2019-01-03T00:00:00

Link: CVE-2019-3875

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-12T14:29:04.760

Modified: 2024-11-21T04:42:46.400

Link: CVE-2019-3875

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-06-11T14:22:00Z

Links: CVE-2019-3875 - Bugzilla

cve-icon OpenCVE Enrichment

No data.