Insecure temporary directory processing in keycloak



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-20202
CWE-ID CWE-377
Exploitation vector Local
Public exploit N/A
Vulnerable software
Keycloak
Server applications / Directory software, identity management

Vendor Keycloak

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Insecure Temporary File

EUVDB-ID: #VU53528

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-20202

CWE-ID: CWE-377 - Insecure Temporary File

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way keycloak handles temporary directories on the system. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Keycloak: 10.0.0 - 12.0.4

CPE2.3 External links

https://bugzilla.redhat.com/show_bug.cgi?id=1922128


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###