Description
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
Remediation
References
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157
http://www.securityfocus.com/bid/108734
Related Vulnerabilities
CVE-2021-21295 Vulnerability in maven package io.netty:netty-codec-http2
CVE-2022-43434 Vulnerability in maven package io.jenkins.plugins:neuvector-vulnerability-scanner
CVE-2021-29620 Vulnerability in maven package com.epam.reportportal:service-api
CVE-2022-0437 Vulnerability in npm package karma
CVE-2022-42129 Vulnerability in maven package com.liferay:com.liferay.dynamic.data.mapping.form.web