A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1714 Issue Tracking Vendor Advisory
https://github.com/keycloak/keycloak/pull/7053 Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2020-05-13T18:25:56

Updated: 2020-05-13T18:25:56

Reserved: 2019-11-27T00:00:00


Link: CVE-2020-1714

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-05-13T19:15:11.987

Modified: 2021-10-19T14:15:07.277


Link: CVE-2020-1714

JSON object: View

cve-icon Redhat Information

No data.

CWE