Vulnerability Details : CVE-2019-10169
A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.
Vulnerability category: Execute code
Products affected by CVE-2019-10169
- cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-10169
0.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-10169
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
6.6
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.7
|
5.9
|
Red Hat, Inc. | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2019-10169
-
A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2019-10169
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10169
1721302 – (CVE-2019-10169) CVE-2019-10169 keycloak: script execution via UMA policy triggerIssue Tracking;Vendor Advisory
Jump to