It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-02-21T18:00:00Z

Updated: 2018-02-21T17:57:01

Reserved: 2017-08-01T00:00:00


Link: CVE-2017-12161

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-02-21T18:29:00.213

Modified: 2019-10-09T23:22:23.590


Link: CVE-2017-12161

JSON object: View

cve-icon Redhat Information

No data.