Description
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
Published: 2021-03-08
Score: 6.5 Medium
EPSS: 85.1% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pcv5-m2wh-66j3 Keycloak discloses information without authentication
History

No history.

Subscriptions

Redhat Keycloak Single Sign-on
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T16:25:43.769Z

Reserved: 2020-10-27T00:00:00.000Z

Link: CVE-2020-27838

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-08T22:15:13.423

Modified: 2024-11-21T05:21:54.503

Link: CVE-2020-27838

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-12-11T00:00:00Z

Links: CVE-2020-27838 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses