Description
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
Remediation
References
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157
http://www.securityfocus.com/bid/108734
Related Vulnerabilities
CVE-2015-5258 Vulnerability in maven package org.springframework.social:spring-social-core
CVE-2016-10735 Vulnerability in maven package org.webjars.bowergithub.angular-ui:bootstrap
CVE-2021-21616 Vulnerability in maven package org.biouno:uno-choice
CVE-2021-32808 Vulnerability in maven package org.webjars.npm:ckeditor4
CVE-2023-27987 Vulnerability in maven package org.apache.linkis:linkis-cli-application