Vulnerabilities > Redhat > Single Sign ON > 7.1

DATE CVE VULNERABILITY TITLE RISK
2023-12-14 CVE-2023-6134 Cross-site Scripting vulnerability in Redhat products
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token.
network
low complexity
redhat CWE-79
5.4
2023-08-04 CVE-2023-0264 Improper Authentication vulnerability in Redhat products
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests.
network
high complexity
redhat CWE-287
5.0
2021-05-26 CVE-2020-10695 Unspecified vulnerability in Redhat Single Sign-On
An insecure modification flaw in the /etc/passwd file was found in the redhat-sso-7 container.
local
low complexity
redhat
7.8
2021-01-12 CVE-2020-14341 Unspecified vulnerability in Redhat Single Sign-On
The "Test Connection" available in v7.x of the Red Hat Single Sign On application console can permit an authorized user to cause SMTP connections to be attempted to arbitrary hosts and ports of the user's choosing, and originating from the RHSSO installation.
network
low complexity
redhat
2.7
2020-09-16 CVE-2020-10748 Cross-site Scripting vulnerability in Redhat Keycloak and Single Sign-On
A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances.
network
low complexity
redhat CWE-79
6.1
2019-10-02 CVE-2019-10212 Information Exposure Through Log Files vulnerability in multiple products
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security.
network
low complexity
redhat netapp CWE-532
critical
9.8
2019-06-12 CVE-2019-10157 Improper Authentication vulnerability in Redhat Keycloak and Single Sign-On
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout .
local
low complexity
redhat CWE-287
5.5
2018-03-12 CVE-2017-2585 Information Exposure vulnerability in Redhat Keycloak
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
network
high complexity
redhat CWE-200
5.9
2018-03-12 CVE-2016-8629 Permissions, Privileges, and Access Controls vulnerability in Redhat Keycloak
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server.
network
low complexity
redhat CWE-264
6.5
2017-10-26 CVE-2017-12159 Insufficient Session Expiration vulnerability in multiple products
It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session.
network
low complexity
redhat keycloak CWE-613
7.5