keycloak vulnerable to unauthorized login via mail server setup
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Nov 6, 2023
Description
Published by the National Vulnerability Database
Jan 7, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Sep 12, 2022
Last updated
Nov 6, 2023
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be '[email protected]'.
References