Domain-based Password Reset Vulnerability in Keycloak

Domain-based Password Reset Vulnerability in Keycloak

CVE-2019-14837 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.

Learn more about our Cis Benchmark Audit For Server Software.