Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.1"
}
],
"cpe": "cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
}
],
"cpe": "cpe:2.3:a:redhat:single_sign_on:7.2:*:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.5.1"
}
],
"cpe": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*"
}