A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2019-06-12T13:51:38

Updated: 2024-08-04T19:19:18.609Z

Reserved: 2019-01-03T00:00:00

Link: CVE-2019-3875

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-12T14:29:04.760

Modified: 2019-10-09T23:49:50.570

Link: CVE-2019-3875

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-06-11T14:22:00Z

Links: CVE-2019-3875 - Bugzilla