Bug 1484564 (CVE-2017-12161) - CVE-2017-12161 keycloak: reset password token disclosure
Summary: CVE-2017-12161 keycloak: reset password token disclosure
Status: NEW
Alias: CVE-2017-12161
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20171214,repor...
Keywords: Security
: CVE-2017-1000500 (view as bug list)
Depends On:
Blocks: 1484091 1533321
TreeView+ depends on / blocked
 
Reported: 2017-08-23 21:04 UTC by Chess Hazlett
Modified: 2019-06-08 22:15 UTC (History)
17 users (show)

(edit)
it was found that keycloak would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description Chess Hazlett 2017-08-23 21:04:13 UTC
https://issues.jboss.org/browse/KEYCLOAK-5299

Comment 1 Jason Shepherd 2018-01-10 05:03:39 UTC
Attack relies on compromising /etc/hosts file and tricking user into clicking reset password link with invalid URL. Wontfix for RHMAP-4

Comment 2 Jason Shepherd 2018-02-15 23:31:40 UTC
*** Bug 1533319 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.