Vulnerabilities > Redhat > Keycloak

DATE CVE VULNERABILITY TITLE RISK
2018-05-11 CVE-2016-8627 Resource Exhaustion vulnerability in Redhat Jboss Enterprise Application Platform and Keycloak
admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks.
network
low complexity
redhat CWE-400
6.5
2018-03-12 CVE-2017-2585 Information Exposure vulnerability in Redhat Keycloak and Single Sign ON
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
network
redhat CWE-200
4.3
2018-03-12 CVE-2016-8629 Permissions, Privileges, and Access Controls vulnerability in Redhat Keycloak and Single Sign ON
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server.
network
low complexity
redhat CWE-264
5.5
2017-10-26 CVE-2017-12160 Improper Authentication vulnerability in Redhat Keycloak
It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation.
network
low complexity
redhat CWE-287
6.5