Total vulnerabilities in the database
A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running application.
Software | From | Fixed in |
---|---|---|
redhat / keycloak | - | 8.0.0 |