Description
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
Remediation
References
http://www.securityfocus.com/bid/108734
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157
Related Vulnerabilities
CVE-2021-33605 Vulnerability in maven package com.vaadin:vaadin-checkbox-flow
CVE-2018-1999001 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-4040 Vulnerability in maven package org.apache.activemq:artemis-commons
CVE-2022-46907 Vulnerability in maven package org.apache.jspwiki:jspwiki-main
CVE-2020-2260 Vulnerability in maven package org.jenkins-ci.plugins:perfecto