Code Injection Vulnerability in Keycloak by Red Hat
CVE-2020-1714

7.5HIGH

Key Information:

Vendor
Red Hat
Status
Vendor
CVE Published:
13 May 2020

Summary

A significant vulnerability exists in Keycloak prior to version 11.0.0 due to the use of ObjectInputStream without proper type checks. This flaw enables an attacker to introduce arbitrary serialized Java Objects, allowing for deserialization in a privileged context. As a result, this can lead to unauthorized remote code execution, posing serious security risks for affected systems.

Affected Version(s)

keycloak before 11.0.0

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.