Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-2419

Опубликовано: 16 апр. 2024
Источник: redhat
CVSS3: 7.1

Описание

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other users. It is very similar to CVE-2023-6291.

Отчет

Note that this affects only Keycloak and Red Hat build of Keycloak, which uses Quarkus in under layers. Red Hat Single Sign-On is not affected since the parsing that comes from Wildfly is done correctly.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2269371keycloak: path traversal in the redirect validation

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
почти 2 года назад

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other users. It is very similar to CVE-2023-6291.

CVSS3: 7.1
debian
почти 2 года назад

A flaw was found in Keycloak's redirect_uri validation logic. This iss ...

CVSS3: 7.1
github
почти 2 года назад

Keycloak path traversal vulnerability in the redirect validation

7.1 High

CVSS3