CVE-2019-14832: Keycloak Unauthenticated Access
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58851%
CWE
Published
5/24/2022
Updated
8/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.keycloak:keycloak-model-infinispan | maven | < 7.0.1 | 7.0.1 |
| org.keycloak:keycloak-model-jpa | maven | < 7.0.1 | 7.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing realm validation in two critical user retrieval paths: 1) The cache implementation (UserCacheSession) didn't check if the cached user's realm matched the request context. 2) The JPA provider (JpaUserProvider) didn't include realm ID in its database query constraints. The commit 0b73685 added realm checks in both locations, confirming these were the vulnerable points. The accompanying test (UserTest.testAccessUserFromOtherRealm) demonstrates the exploit scenario prevented by these fixes.