Описание
Keycloak vulnerable to Server-Side Request Forgery
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-10770
- https://github.com/keycloak/keycloak-documentation/pull/1086
- https://github.com/keycloak/keycloak/pull/7714
- https://bugzilla.redhat.com/show_bug.cgi?id=1846270
- https://issues.redhat.com/browse/KEYCLOAK-14019
- https://issues.redhat.com/browse/KEYCLOAK-3426
- http://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html
Пакеты
org.keycloak:keycloak-core
< 13.0.0
13.0.0
Связанные уязвимости
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
A flaw was found in Keycloak before 13.0.0, where it is possible to fo ...