CVE-2021-3827 log
Source |
|
Severity | High |
Remote | Yes |
Type | Authentication bypass |
Description | A security issue was found in keycloak version 15 where because of the default ECP binding flow, any other authentication flow can be bypassed. By exploiting this behavior, an attacker would be able to bypass the MFA authentication by sending a SOAP request with AuthnRequest and Authorization header with the user credentials. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1332 | keycloak | 15.0.2-1 | 16.0.0-1 | High | Fixed |
References |
---|
https://bugzilla.redhat.com/show_bug.cgi?id=2007512 https://issues.redhat.com/browse/KEYCLOAK-19177 https://github.com/keycloak/keycloak/commit/44000caaf5051d7f218d1ad79573bd3d175cad0d |
Notes |
---|
backported to 17.0.1-3 https://github.com/archlinux/svntogit-community/commit/d337b5e05da257868e1fec7eaa9544cb30fb6736 |