Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10770

Опубликовано: 26 нояб. 2020
Источник: redhat
CVSS3: 5.8
EPSS Критический

Описание

A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.

A flaw was found in Keycloak, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7keycloakNot affected
Red Hat Fuse 7keycloakNot affected
Red Hat OpenShift Application RuntimeskeycloakNot affected
Red Hat Process Automation 7keycloakNot affected
Red Hat support for Spring BootkeycloakNot affected
Red Hat Single Sign-On 7.4.5FixedRHSA-2021:032701.02.2021
Red Hat Single Sign-On 7.4 for RHEL 6rh-sso7-keycloakFixedRHSA-2021:031801.02.2021
Red Hat Single Sign-On 7.4 for RHEL 7rh-sso7-keycloakFixedRHSA-2021:031901.02.2021
Red Hat Single Sign-On 7.4 for RHEL 8rh-sso7-keycloakFixedRHSA-2021:032001.02.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=1846270keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter

EPSS

Процентиль: 100%
0.92282
Критический

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
около 5 лет назад

A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.

CVSS3: 5.3
debian
около 5 лет назад

A flaw was found in Keycloak before 13.0.0, where it is possible to fo ...

CVSS3: 5.3
github
больше 3 лет назад

Keycloak vulnerable to Server-Side Request Forgery

EPSS

Процентиль: 100%
0.92282
Критический

5.8 Medium

CVSS3