Authentication Bypass by Capture-replay
CVE-2020-14302
Summary
A flaw was found in Keycloak where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same "state" parameter. This flaw allows a malicious user to perform replay attacks.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- HIGH
- NONE
- NONE
CWE-294 - Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
References
Advisory Timeline
- Published