Bug 1800573 (CVE-2020-1727) - CVE-2020-1727 keycloak: missing input validation in IDP authorization URLs
Summary: CVE-2020-1727 keycloak: missing input validation in IDP authorization URLs
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-1727
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1800574
TreeView+ depends on / blocked
 
Reported: 2020-02-07 13:04 UTC by Guilherme de Almeida Suckevicz
Modified: 2020-06-01 17:20 UTC (History)
25 users (show)

Fixed In Version: keycloak 9.0.2
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Keycloak, where every Authorization URL that points to an IDP server lacks proper input validation as it allows a wide range of characters. This flaw allows a malicious to craft deep links that introduce further attack scenarios on affected clients.
Clone Of:
Environment:
Last Closed: 2020-06-01 17:20:35 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:2252 None None None 2020-06-01 15:32:37 UTC

Description Guilherme de Almeida Suckevicz 2020-02-07 13:04:26 UTC
During the assessment of the Admin Console application, it was found that almost every Authorization URL that points to an IDP server lacks on proper input validation. There is no need to allow a wide range of characters that a malicious user might be able to use to craft deep links that can introduce further attack scenarios on affected clients.

Reference:
https://issues.redhat.com/browse/KEYCLOAK-12192

Comment 7 Paramvir jindal 2020-05-20 10:26:54 UTC
Acknowledgments:

Name: Sebastian Moritz (Cure53)

Comment 8 errata-xmlrpc 2020-06-01 15:32:35 UTC
This issue has been addressed in the following products:

  Red Hat Runtimes Spring Boot 2.2.6

Via RHSA-2020:2252 https://access.redhat.com/errata/RHSA-2020:2252

Comment 9 Product Security DevOps Team 2020-06-01 17:20:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-1727


Note You need to log in before you can comment on or make changes to this bug.