Code Injection Vulnerability in Keycloak by Red Hat
CVE-2020-1714
7.5HIGH
Summary
A significant vulnerability exists in Keycloak prior to version 11.0.0 due to the use of ObjectInputStream without proper type checks. This flaw enables an attacker to introduce arbitrary serialized Java Objects, allowing for deserialization in a privileged context. As a result, this can lead to unauthorized remote code execution, posing serious security risks for affected systems.
Affected Version(s)
keycloak before 11.0.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved