Описание
Keycloak leaks configured LDAP bind credentials through the Keycloak admin console
Impact
The LDAP testing endpoint allows to change the Connection URL independently of and without having to re-enter the currently configured LDAP bind credentials. An attacker with admin access (permission manage-realm) can change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console/compromised a user with sufficient privileges can leak domain credentials and can now attack the domain.
Acknowledgements
Special thanks to Simon Wessling for reporting this issue and helping us improve our project
Ссылки
- https://github.com/keycloak/keycloak/security/advisories/GHSA-c25h-c27q-5qpv
- https://nvd.nist.gov/vuln/detail/CVE-2024-5967
- https://github.com/keycloak/keycloak/issues/30434
- https://github.com/keycloak/keycloak/commit/0d0530046b9cb4b0d74d2fdefc9bd04f1d20cac0
- https://github.com/keycloak/keycloak/commit/1f56a9e48bf96c3bcb18dfc6cd93e3dd16f281f1
- https://github.com/keycloak/keycloak/commit/bde8568d4174a7072f7c7bb507d2c7d05824b1a6
- https://access.redhat.com/security/cve/CVE-2024-5967
- https://bugzilla.redhat.com/show_bug.cgi?id=2292200
Пакеты
org.keycloak:keycloak-ldap-federation
= 25.0.0
25.0.1
org.keycloak:keycloak-ldap-federation
<= 22.0.11
22.0.12
org.keycloak:keycloak-ldap-federation
>= 23.0.0, <= 24.0.5
24.0.6
Связанные уязвимости
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
A vulnerability was found in Keycloak. The LDAP testing endpoint allow ...