← Voltar para CVEs
CVE-2024-7318
MEDIUM4.8
Descricao
A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute. A one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid.
Detalhes CVE
Pontuacao CVSS v3.14.8
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado9/9/2024
Ultima modificacao10/7/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
redhat:build_of_keycloak
Fraquezas (CWE)
CWE-324
Referencias
https://access.redhat.com/errata/RHSA-2024:6502(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:6503(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-7318(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2301876(secalert@redhat.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.