Bug 1705975 (CVE-2020-1714) - CVE-2020-1714 keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution
Summary: CVE-2020-1714 keycloak: Lack of checks in ObjectInputStream leading to Remote...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-1714
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1705976
TreeView+ depends on / blocked
 
Reported: 2019-05-03 10:27 UTC by Marian Rehak
Modified: 2021-02-16 21:59 UTC (History)
55 users (show)

Fixed In Version: keycloak 11.0.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Keycloak, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
Clone Of:
Environment:
Last Closed: 2020-07-02 13:27:39 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:2813 0 None None None 2020-07-02 13:21:28 UTC
Red Hat Product Errata RHSA-2020:2814 0 None None None 2020-07-02 13:37:35 UTC
Red Hat Product Errata RHSA-2020:2816 0 None None None 2020-07-02 14:29:21 UTC
Red Hat Product Errata RHSA-2020:2905 0 None None None 2020-07-23 07:04:03 UTC
Red Hat Product Errata RHSA-2020:3017 0 None None None 2020-07-27 13:09:03 UTC
Red Hat Product Errata RHSA-2020:3675 0 None None None 2020-09-08 09:33:07 UTC
Red Hat Product Errata RHSA-2020:3678 0 None None None 2020-09-08 09:45:06 UTC
Red Hat Product Errata RHSA-2020:4252 0 None None None 2020-10-14 11:17:18 UTC
Red Hat Product Errata RHSA-2020:5568 0 None None None 2020-12-16 12:12:08 UTC

Description Marian Rehak 2019-05-03 10:27:21 UTC
The Keycloak code base contains some usages of ObjectInputStream without any type checks. This could be exploited by attackers being able to inject arbitrarily serialized Java Objects which would then get deserialized in a priviliged context potentially leading to Remote Code Execution.

References:

https://github.com/keycloak/keycloak/pull/7053
https://issues.jboss.org/browse/KEYCLOAK-10162

Comment 1 Jason Shepherd 2019-08-12 02:02:53 UTC
Red Hat Mobile application platform (RHMAP) does not make use of the Keycloak Kerberos 5 Delegated Authorization feature, which does the unsafe deserialization. The other usage of ObjectInputStream pointed out in KEYCLOAK-10162 is used for reading the KeycloakSecurityContext out of the HTTP cache in the application server, which doesn't pose a threat to RHMAP because it's not accepting user input to be deserialized.

Comment 2 Joshua Padman 2019-08-12 02:17:31 UTC
This vulnerability is out of security support scope for the following product:
 * Red Hat Mobile Application Platform

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 11 Paramvir jindal 2020-05-11 15:10:20 UTC
Acknowledgments:

Name: Thomas Darimont

Comment 15 Chess Hazlett 2020-07-01 15:27:13 UTC
Mitigation:

There is currently no known mitigation for this issue.

Comment 16 errata-xmlrpc 2020-07-02 13:21:24 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.1

Via RHSA-2020:2813 https://access.redhat.com/errata/RHSA-2020:2813

Comment 17 Product Security DevOps Team 2020-07-02 13:27:39 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-1714

Comment 18 errata-xmlrpc 2020-07-02 13:37:32 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 6
  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 8

Via RHSA-2020:2814 https://access.redhat.com/errata/RHSA-2020:2814

Comment 19 errata-xmlrpc 2020-07-02 14:29:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6
  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7

Via RHSA-2020:2816 https://access.redhat.com/errata/RHSA-2020:2816

Comment 20 errata-xmlrpc 2020-07-23 07:04:01 UTC
This issue has been addressed in the following products:

  Red Hat Openshift Application Runtimes

Via RHSA-2020:2905 https://access.redhat.com/errata/RHSA-2020:2905

Comment 21 errata-xmlrpc 2020-07-27 13:08:59 UTC
This issue has been addressed in the following products:

  Red Hat Runtimes Spring Boot 2.1.15

Via RHSA-2020:3017 https://access.redhat.com/errata/RHSA-2020:3017

Comment 24 errata-xmlrpc 2020-09-08 09:33:03 UTC
This issue has been addressed in the following products:

  Red Hat Decision Manager

Via RHSA-2020:3675 https://access.redhat.com/errata/RHSA-2020:3675

Comment 25 errata-xmlrpc 2020-09-08 09:45:00 UTC
This issue has been addressed in the following products:

  Red Hat Process Automation

Via RHSA-2020:3678 https://access.redhat.com/errata/RHSA-2020:3678

Comment 27 errata-xmlrpc 2020-10-14 11:17:13 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 1.7.5

Via RHSA-2020:4252 https://access.redhat.com/errata/RHSA-2020:4252

Comment 28 errata-xmlrpc 2020-12-16 12:12:01 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.8.0

Via RHSA-2020:5568 https://access.redhat.com/errata/RHSA-2020:5568


Note You need to log in before you can comment on or make changes to this bug.