Vulnerability Description
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be '[email protected]'.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Keycloak | < 8.0.0 |
| Redhat | Single Sign-On | 7.3 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837ExploitIssue TrackingVendor Advisory
- https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580PatchThird Party Advisory
- https://issues.jboss.org/browse/KEYCLOAK-10780Issue TrackingPermissions RequiredVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837ExploitIssue TrackingVendor Advisory
- https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580PatchThird Party Advisory
- https://issues.jboss.org/browse/KEYCLOAK-10780Issue TrackingPermissions RequiredVendor Advisory
FAQ
What is CVE-2019-14837?
CVE-2019-14837 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For...
How severe is CVE-2019-14837?
CVE-2019-14837 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-14837?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Keycloak, Redhat Single Sign-On.