Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-3782

Опубликовано: 12 дек. 2022
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.

Отчет

Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason Quarkus is marked with Low impact.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of QuarkuskeycloakAffected
Red Hat Data Grid 8org.wildfly.security-wildfly-elytron-parentNot affected
Red Hat Fuse 7keycloakFix deferred
Red Hat JBoss Data Grid 7keycloakNot affected
Red Hat JBoss Enterprise Application Platform 6keycloakOut of support scope
Red Hat JBoss Enterprise Application Platform 7keycloak-coreNot affected
AMQ Broker 7.10.3keycloakFixedRHSA-2023:318517.05.2023
AMQ Broker 7.11.0keycloakFixedRHSA-2023:166105.04.2023
Migration Toolkit for Runtimes 1 on RHEL 8org.keycloak-keycloak-parentFixedRHSA-2023:128516.03.2023
MTA-6.1-RHEL-8mta/mta-windup-addon-rhel8FixedRHSA-2023:204127.04.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2138971keycloak: path traversal via double URL encoding

EPSS

Процентиль: 34%
0.00141
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
около 3 лет назад

keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.

CVSS3: 9.1
debian
около 3 лет назад

keycloak: path traversal via double URL encoding. A flaw was found in ...

CVSS3: 9.1
github
около 3 лет назад

Keycloak vulnerable to path traversal via double URL encoding

EPSS

Процентиль: 34%
0.00141
Низкий

8.1 High

CVSS3