cvelist/2016/8xxx/CVE-2016-8629.json

89 lines
2.6 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com",
"DATE_PUBLIC" : "2017-04-04T00:00:00",
2017-10-16 12:31:07 -04:00
"ID" : "CVE-2016-8629",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Keycloak",
"version" : {
"version_data" : [
{
"version_value" : "2.4.0"
}
]
}
}
]
},
"vendor_name" : "Red Hat, Inc."
}
]
}
2017-10-16 12:31:07 -04:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-284"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1388988",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1388988"
2018-03-13 06:02:26 -04:00
},
{
"name" : "RHSA-2017:0872",
"refsource" : "REDHAT",
2018-03-13 06:02:26 -04:00
"url" : "https://access.redhat.com/errata/RHSA-2017:0872"
},
{
"name" : "RHSA-2017:0873",
"refsource" : "REDHAT",
2018-03-13 06:02:26 -04:00
"url" : "https://access.redhat.com/errata/RHSA-2017:0873"
},
{
"name" : "RHSA-2017:0876",
"refsource" : "REDHAT",
2018-03-13 06:02:26 -04:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0876.html"
},
{
"name" : "97392",
"refsource" : "BID",
2018-03-13 06:02:26 -04:00
"url" : "http://www.securityfocus.com/bid/97392"
},
{
"name" : "1038180",
"refsource" : "SECTRACK",
2018-03-13 06:02:26 -04:00
"url" : "http://www.securitytracker.com/id/1038180"
2017-10-16 12:31:07 -04:00
}
]
}
}