Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-1132

Опубликовано: 17 апр. 2024
Источник: nvd
CVSS3: 8.1
EPSS Низкий

Описание

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:*
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
Версия от 21.1.0 (включая) до 22.0.10 (исключая)
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
Версия от 23.0.0 (включая) до 24.0.3 (исключая)
cpe:2.3:a:redhat:migration_toolkit_for_applications:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:migration_toolkit_for_runtimes:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*

EPSS

Процентиль: 44%
0.00213
Низкий

8.1 High

CVSS3

Дефекты

CWE-22
CWE-22

Связанные уязвимости

CVSS3: 8.1
redhat
почти 2 года назад

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.

CVSS3: 8.1
debian
почти 2 года назад

A flaw was found in Keycloak, where it does not properly validate URLs ...

CVSS3: 8.1
github
почти 2 года назад

Keycloak path traversal vulnerability in redirection validation

EPSS

Процентиль: 44%
0.00213
Низкий

8.1 High

CVSS3

Дефекты

CWE-22
CWE-22