Vulnerability Description
A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Keycloak | 7.0.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14910Issue TrackingMitigationVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14910Issue TrackingMitigationVendor Advisory
FAQ
What is CVE-2019-14910?
CVE-2019-14910 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication ...
How severe is CVE-2019-14910?
CVE-2019-14910 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-14910?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Keycloak.