Executive Summary

Informations
NameCVE-2019-3875First vendor Publication2019-06-12
VendorCveLast vendor Modification2019-06-14

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:N)
Cvss Base Score5.8Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3875

CWE : Common Weakness Enumeration

%idName
100 %CWE-295Certificate Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application71
Application1

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/108748
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2019-06-17 17:19:06
  • Multiple Updates
2019-06-14 17:18:58
  • Multiple Updates
2019-06-13 21:19:26
  • Multiple Updates
2019-06-12 21:19:23
  • First insertion