CVE-2019-14837
moderate-risk
Published 2020-01-07
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
Do I need to act?
~
1.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (2)
Affected Vendors
References (6)
Issue Tracking
https://issues.jboss.org/browse/KEYCLOAK-10780
Issue Tracking
https://issues.jboss.org/browse/KEYCLOAK-10780
41
/ 100
moderate-risk
Severity
31/34 · Critical
Exploitability
3/34 · Minimal
Exposure
7/34 · Low