A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2020-1744 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744 | Issue Tracking Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2020-1744 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2020-1744 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744 - Issue Tracking, Vendor Advisory |
14 Sep 2021, 13:30
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-755 |
Information
Published : 2020-03-24 14:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1744
Mitre link : CVE-2020-1744
CVE.ORG link : CVE-2020-1744
JSON object : View
Products Affected
redhat
- keycloak
CWE
CWE-755
Improper Handling of Exceptional Conditions