Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202005-8: keycloak: arbitrary code execution

    Date
    197
    Posted By
    The package keycloak before version 10.0.1-1 is vulnerable to arbitrary code execution.
    Arch Linux Security Advisory ASA-202005-8
    =========================================
    
    Severity: High
    Date    : 2020-05-16
    CVE-ID  : CVE-2020-1714
    Package : keycloak
    Type    : arbitrary code execution
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1158
    
    Summary
    =======
    
    The package keycloak before version 10.0.1-1 is vulnerable to arbitrary
    code execution.
    
    Resolution
    ==========
    
    Upgrade to 10.0.1-1.
    
    # pacman -Syu "keycloak>=10.0.1-1"
    
    The problem has been fixed upstream in version 10.0.1.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    A flaw was found in Keycloak, where the code base contains usages of
    ObjectInputStream without type checks. This flaw allows an attacker to
    inject arbitrarily serialized Java Objects, which would then get
    deserialized in a privileged context and potentially lead to remote
    code execution.
    
    Impact
    ======
    
    An authenticated remote attacker could execute arbitrary code by
    injecting values into a custom attribute.
    
    References
    ==========
    
    https://bugs.archlinux.org/task/66642
    https://github.com/keycloak/keycloak/pull/7053
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1714
    https://security.archlinux.org/CVE-2020-1714
    
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.