Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-parent
  4. ›
  5. CVE-2017-12159

CVE-2017-12159: Insufficient Session Expiration

May 13, 2022 (updated July 26, 2023)

It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible information disclosure or further attacks.

References

  • access.redhat.com/errata/RHSA-2017:2904
  • access.redhat.com/errata/RHSA-2017:2905
  • access.redhat.com/errata/RHSA-2017:2906
  • bugzilla.redhat.com/show_bug.cgi?id=1484111
  • github.com/advisories/GHSA-7fmw-85qm-h22p
  • nvd.nist.gov/vuln/detail/CVE-2017-12159
  • web.archive.org/web/20210124113906/http://www.securityfocus.com/bid/101601

Code Behaviors & Features

Detect and mitigate CVE-2017-12159 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.4.0

Fixed versions

  • 3.4.0

Solution

Upgrade to version 3.4.0 or above.

Impact 7.5 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)
  • CWE-613: Insufficient Session Expiration

Source file

maven/org.keycloak/keycloak-parent/CVE-2017-12159.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:20 +0000.