CVE-2020-10734:
OIDC Logout redirect in keycloak
3.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.03476%
CWE
Published
4/28/2022
Updated
1/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.keycloak:keycloak-oidc-client-adapter-pom | maven | < 18.0.0 | 18.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the OIDC logout endpoint lacking CSRF protection. Keycloak's LogoutEndpoint
class handles the logout logic, and the absence of CSRF checks in the logout method allows attackers to exploit this by crafting malicious requests. The advisory explicitly references the OIDC protocol component (org.keycloak.protocol.oidc
) and the CWE-601 context (though misclassified, the root issue is CSRF). The patched version 18.0.0
likely added CSRF validation()
to this endpoint, confirming the function's role in the vulnerability.