Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1180

Опубликовано: 19 янв. 2026
Источник: redhat
CVSS3: 5.8
EPSS Низкий

Описание

A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the destination. This enables attackers to coerce the Keycloak server into making HTTP requests to internal or restricted network resources. As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk.

Отчет

This vulnerability is rated Moderate for Red Hat. The flaw in Keycloak's OIDC Dynamic Client Registration allows an attacker to force the Keycloak server to make requests to internal network resources via a crafted jwks_uri parameter. This can lead to information disclosure and internal network reconnaissance, particularly in configurations that permit anonymous or token-based client registration.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Build of Keycloakrhbk/keycloak-operator-bundleFix deferred
Red Hat Build of Keycloakrhbk/keycloak-rhel9Affected
Red Hat Build of Keycloakrhbk/keycloak-rhel9-operatorFix deferred
Red Hat JBoss Enterprise Application Platform 8keycloak-servicesNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packkeycloak-servicesNot affected
Red Hat Single Sign-On 7keycloak-servicesNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2430781org.keycloak.protocol.oidc: Blind Server-Side Request Forgery (SSRF) in Keycloak OIDC Dynamic Client Registration via jwks_uri

EPSS

Процентиль: 13%
0.00042
Низкий

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
nvd
2 месяца назад

A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the destination. This enables attackers to coerce the Keycloak server into making HTTP requests to internal or restricted network resources. As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk.

CVSS3: 5.8
debian
2 месяца назад

A flaw was identified in Keycloak\u2019s OpenID Connect Dynamic Client ...

CVSS3: 5.8
github
2 месяца назад

Keycloak’s OpenID Connect Dynamic Client Registration feature affected by Server-Side Request Forgery (SSRF)

EPSS

Процентиль: 13%
0.00042
Низкий

5.8 Medium

CVSS3