Improper Input Validation Affecting org.keycloak:keycloak-services package, versions [,9.0.0)
Threat Intelligence
EPSS
0.05% (25th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGKEYCLOAK-1055291
- published 4 Jan 2021
- disclosed 4 Jan 2021
- credit Paramvir Jindal
Introduced: 4 Jan 2021
CVE-2020-35509 Open this link in a new tabHow to fix?
Upgrade org.keycloak:keycloak-services
to version 9.0.0 or higher.
Overview
org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.
Affected versions of this package are vulnerable to Improper Input Validation. Depending on the webserver configuration, a malicious user can supply an expired certificate and it would be accepted by Keycloak direct-grant authenticator. This is because Keycloak does not trigger the appropriate timestamp validation.
References
CVSS Scores
version 3.1