Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-1132

Опубликовано: 16 апр. 2024
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.

Отчет

Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution, but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason, Quarkus is marked as having a Low impact.

Меры по смягчению последствий

No current mitigation is available for this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apicurio Registry 2keycloakAffected
Red Hat build of Quarkusorg.keycloak/keycloak-coreAffected
Red Hat Data Grid 8org.wildfly.security-wildfly-elytron-parentNot affected
Red Hat Decision Manager 7keycloakOut of support scope
Red Hat Fuse 7keycloakFix deferred
Red Hat JBoss Data Grid 7keycloakNot affected
Red Hat JBoss Enterprise Application Platform 6keycloakOut of support scope
Red Hat JBoss Enterprise Application Platform 7keycloak-coreNot affected
Red Hat Process Automation 7keycloakAffected
Migration Toolkit for Runtimes 1 on RHEL 8mtr/mtr-operator-bundleFixedRHSA-2024:391913.06.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2262117keycloak: path transversal in redirection validation

EPSS

Процентиль: 44%
0.00213
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
почти 2 года назад

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.

CVSS3: 8.1
debian
почти 2 года назад

A flaw was found in Keycloak, where it does not properly validate URLs ...

CVSS3: 8.1
github
почти 2 года назад

Keycloak path traversal vulnerability in redirection validation

EPSS

Процентиль: 44%
0.00213
Низкий

8.1 High

CVSS3