GHSA-68hw-vfh7-xvg8

Suggest an improvement
Source
https://github.com/advisories/GHSA-68hw-vfh7-xvg8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/06/GHSA-68hw-vfh7-xvg8/GHSA-68hw-vfh7-xvg8.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-68hw-vfh7-xvg8
Aliases
Published
2019-06-13T20:38:09Z
Modified
2023-11-01T04:49:55.066824Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Forced Logout in keycloak-connect
Details

Versions of keycloak-connect prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the /k_logout route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely.

Recommendation

Upgrade to version 4.4.0 or later.

Database specific
{
    "nvd_published_at": "2019-06-12T14:29:00Z",
    "github_reviewed_at": "2019-06-13T20:28:41Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-287",
        "CWE-345"
    ]
}
References

Affected packages

npm / keycloak-connect

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.8.3