Description
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
Remediation
References
http://www.securityfocus.com/bid/108734
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157
Related Vulnerabilities
CVE-2020-7691 Vulnerability in maven package org.webjars.npm:jspdf
CVE-2021-21175 Vulnerability in maven package org.webjars.npm:electron
CVE-2021-29480 Vulnerability in maven package io.ratpack:ratpack-session
CVE-2023-40037 Vulnerability in maven package org.apache.nifi:nifi-dbcp-service-api
CVE-2021-21295 Vulnerability in maven package io.netty:netty-codec-http2