| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2014-3655
Vulnerability Database
maven
CVE-2014-3655
Base Score
MEDIUM
4.3
CVE-2014-3655
JBoss KeyCloak is vulnerable to soft token deletion via CSRF
Vector
NETWORK
Published By
secalert@redhat.com
Published Date
Nov 13, 2019, 16:15
Affected Versions
(1)
org.keycloak:keycloak-services
(Maven)
Introduced
0
Fixed
1.0.2.Final
Limit
N/A
Package (Ecosystem)
Introduced
Fixed
Limit
org.keycloak:keycloak-services
(Maven)
0
1.0.2.Final
N/A
Weakness Type (CWE)
:
CWE-352
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
4.3
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Base Severity
MEDIUM
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
NONE
Integrity (I)
LOW
Availability (A)
NONE
References
https://access.redhat.com/security/cve/cve-2014-3655
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3655
https://snyk.io/vuln/SNYK-JAVA-ORGKEYCLOAK-30138
Base Score
MEDIUM
4.3
Weakness Type (CWE)
:
CWE-352
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
4.3
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Base Severity
MEDIUM
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
NONE
Integrity (I)
LOW
Availability (A)
NONE