{"containers":{"cna":{"affected":[{"product":"Keycloak","vendor":"Red Hat, Inc.","versions":[{"status":"affected","version":"before 3.4.2.Final"}]}],"datePublic":"2018-02-16T00:00:00.000Z","descriptions":[{"lang":"en","value":"It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-602","description":"CWE-602","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2018-02-21T17:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484564"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T18:28:16.559Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484564"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2017-12161","dateReserved":"2017-08-01T00:00:00.000Z","dateUpdated":"2024-08-05T18:28:16.559Z","state":"PUBLISHED","datePublished":"2018-02-21T18:00:00.000Z"},"dataType":"CVE_RECORD","dataVersion":"5.1"}