CVE-2017-7474
Summary
| CVE | CVE-2017-7474 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-05-12 19:29:00 UTC |
| Updated | 2025-04-20 01:37:25 UTC |
| Description | It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks. |
Risk And Classification
Primary CVSS: v3.0 9.8 CRITICAL from [email protected]
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-253 | NVD-CWE-noinfo | CWE-253 CWE-253
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 9.8 | CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.0 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.0 | cr1 | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.1 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.2 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.3 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.4 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.5 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.6 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 2.5.7 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 3.0.0 | All | All | All |
| Application | Keycloak | Keycloak-nodejs-auth-utils | 3.0.0 | cr1 | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Red Hat Inc. | Keycloak Node.js Adapter | affected 2.5 - 3.0 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| Bug 1445271 – CVE-2017-7474 keycloak-connect: auth token validity check ignored | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 983165 Nodejs (npm) Security Update for keycloak-js (GHSA-mw35-24gh-f82w)