CVE-2019-14837
keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure
Severity Score
Exploit Likelihood
Affected Versions
2Public Exploits
1Exploited in Wild
-Decision
Descriptions
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
Se encontró un fallo en keycloack versiones anteriores a la versión 8.0.0. El propietario del dominio "placeholder.org" puede configurar el servidor de correo sobre este dominio y conociendo solo el nombre de un cliente puede restablecer la contraseña y luego iniciar sesión. Por ejemplo, para el nombre del cliente "prueba", la dirección de correo electrónico será "service-account-test@placeholder.org".
A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.
Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.3.5 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include bypass and information leakage vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-08-10 CVE Reserved
- 2019-12-02 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-547: Use of Hard-coded, Security-relevant Constants
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (4)
URL | Tag | Source |
---|