Always-Incorrect Control Flow Implementation The advisory has been revoked - it doesn't affect any version of package org.keycloak:keycloak-core  (opens in a new tab)


Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGKEYCLOAK-3026902
  • published18 Sept 2022
  • disclosed27 Aug 2022
  • creditUnknown

Introduced: 27 Aug 2022

CVE-2021-3754  (opens in a new tab)
CWE-670  (opens in a new tab)

Amendment

This was deemed not a vulnerability.

Overview

org.keycloak:keycloak-core is an open source identity and access management solution.

Affected versions of this package are vulnerable to Always-Incorrect Control Flow Implementation where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.