Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c25h-c27q-5qpv

Опубликовано: 21 июн. 2024
Источник: github
Github: Прошло ревью
CVSS3: 2.7

Описание

Keycloak leaks configured LDAP bind credentials through the Keycloak admin console

Impact

The LDAP testing endpoint allows to change the Connection URL independently of and without having to re-enter the currently configured LDAP bind credentials. An attacker with admin access (permission manage-realm) can change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console/compromised a user with sufficient privileges can leak domain credentials and can now attack the domain.

Acknowledgements

Special thanks to Simon Wessling for reporting this issue and helping us improve our project

Пакеты

Наименование

org.keycloak:keycloak-ldap-federation

maven
Затронутые версииВерсия исправления

= 25.0.0

25.0.1

Наименование

org.keycloak:keycloak-ldap-federation

maven
Затронутые версииВерсия исправления

<= 22.0.11

22.0.12

Наименование

org.keycloak:keycloak-ldap-federation

maven
Затронутые версииВерсия исправления

>= 23.0.0, <= 24.0.5

24.0.6

EPSS

Процентиль: 34%
0.00137
Низкий

2.7 Low

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 2.7
redhat
больше 1 года назад

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.

CVSS3: 2.7
nvd
больше 1 года назад

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.

CVSS3: 2.7
debian
больше 1 года назад

A vulnerability was found in Keycloak. The LDAP testing endpoint allow ...

EPSS

Процентиль: 34%
0.00137
Низкий

2.7 Low

CVSS3

Дефекты

CWE-276