Описание
Duplicate Advisory: Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-4hx9-48xh-5mxr. This link is maintained to preserve external references.
Original Description
A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-13467
- https://github.com/keycloak/keycloak/issues/44478
- https://github.com/keycloak/keycloak/commit/754c070cf8ca187dcc71f0f72ff3130ff2195328
- https://access.redhat.com/errata/RHSA-2025:22088
- https://access.redhat.com/errata/RHSA-2025:22089
- https://access.redhat.com/errata/RHSA-2025:22090
- https://access.redhat.com/errata/RHSA-2025:22091
- https://access.redhat.com/security/cve/CVE-2025-13467
- https://bugzilla.redhat.com/show_bug.cgi?id=2416038
- https://github.com/keycloak/keycloak/releases/tag/26.4.6
Пакеты
Наименование
org.keycloak:keycloak-ldap-federation
maven
Затронутые версииВерсия исправления
< 26.4.6
26.4.6
5.5 Medium
CVSS3
Дефекты
CWE-502
5.5 Medium
CVSS3
Дефекты
CWE-502