CVE-2022-1466
Description
Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Red Hat Single Sign-On 7.5.0.GA allows unauthorized users to add accounts to the master realm due to improper authorization.
Vulnerability
Red Hat Single Sign-On (RH-SSO) 7.5.0.GA contains an improper authorization vulnerability (CWE-863) that allows users to perform actions they should not be allowed to perform. Specifically, it was possible to add users to the master realm even though no respective permission was granted [1][2]. The issue resides in the authorization logic for realm management, where the server fails to properly enforce permissions for the master realm when handling user creation requests.
Exploitation
An attacker needs a valid user account with administrative privileges in all realms except the master realm, where read-only permissions are granted. Although the "add user" button is not displayed in the master realm UI, the attacker can send a direct server request (e.g., via HTTP API) to create new user accounts in the master realm [2][3]. The SySS advisory provides a proof of concept demonstrating this bypass [2].
Impact
Successful exploitation allows the attacker to create arbitrary user accounts in the master realm, which is the top-level administrative realm. This can lead to privilege escalation, unauthorized access to the entire RH-SSO deployment, and potential compromise of all realms managed by the instance [2].
Mitigation
Red Hat released a fix for this vulnerability on 2022-02-07 [2]. Users should upgrade to a patched version of RH-SSO (e.g., 7.5.1 or later). The Red Hat Bugzilla entry (CVE-2022-1466) was closed as NOTABUG, but the SySS advisory confirms the fix was provided to the vendor and released [4]. No workaround is documented; upgrading is the recommended mitigation.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-coreMaven | < 17.0.1 | 17.0.1 |
Affected products
2- Red Hat/Single Sign-Ondescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-f32v-vf79-p29qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-1466ghsaADVISORY
- bugzilla.redhat.com/show_bug.cgighsax_refsource_MISCWEB
- www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txtghsax_refsource_MISCWEB
- www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.