It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157 | vendor advisory issue tracking |
http://www.securityfocus.com/bid/108734 | third party advisory vdb entry |