SB2022121349 - Red Hat Single Sign-On 7.6 for RHEL 9 update for keycloak



SB2022121349 - Red Hat Single Sign-On 7.6 for RHEL 9 update for keycloak

Published: December 13, 2022

Security Bulletin ID SB2022121349
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2022-3782)

The vulnerability allows a remote attacker to perform path traversal attacks.

The vulnerability exists due to insufficient validation of URLs included in a redirect. A remote attacker can construct a malicious request to bypass validation by using double encoding, access other URLs and potentially sensitive information within the domain.


2) Insufficient Session Expiration (CVE-ID: CVE-2022-3916)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to reuse of session ids across root and user authentication sessions when using a client with the offline_access scope. An attacker with ability to obtain the root session ID can utilize the refresh token and authenticate to the application as another user.

The issue affects shared environments, where the attacker is able to obtain victim's cookies after the victim logs out.


Remediation

Install update from vendor's website.