Skip to content

Exposure of Sensitive Information in keycloak

Moderate severity GitHub Reviewed Published Sep 20, 2021 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

maven org.keycloak:keycloak-core (Maven)

Affected versions

< 9.0.1

Patched versions

9.0.1

Description

A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.

References

Published by the National Vulnerability Database Mar 24, 2020
Reviewed Sep 16, 2021
Published to the GitHub Advisory Database Sep 20, 2021
Last updated Feb 1, 2023

Severity

Moderate
5.6
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVE ID

CVE-2020-1744

GHSA ID

GHSA-4gf2-xv97-63m2

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.