A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1973 | A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events. |
Github GHSA |
GHSA-4gf2-xv97-63m2 | Exposure of Sensitive Information in keycloak |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.879Z
Reserved: 2019-11-27T00:00:00
Link: CVE-2020-1744
No data.
Status : Modified
Published: 2020-03-24T14:15:13.293
Modified: 2024-11-21T05:11:17.480
Link: CVE-2020-1744
OpenCVE Enrichment
No data.
EUVD
Github GHSA