Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4874

Опубликовано: 26 мар. 2026
Источник: redhat
CVSS3: 3.1

Описание

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the client_session_host parameter during refresh token requests. This occurs when a Keycloak client is configured to use the backchannel.logout.url with the application.session.host placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.

Отчет

This flaw allows an authenticated attacker to perform Server-Side Request Forgery (SSRF) by manipulating the client_session_host parameter during refresh token requests. This vulnerability is exploitable when a Keycloak client is configured to use the backchannel.logout.url with the application.session.host placeholder, enabling the attacker to probe internal networks from the Keycloak server's context. Exploitation requires valid user credentials and a logout event.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Build of Keycloakrhbk/keycloak-operator-bundleFix deferred
Red Hat Build of Keycloakrhbk/keycloak-rhel9Affected
Red Hat Build of Keycloakrhbk/keycloak-rhel9-operatorFix deferred
Red Hat JBoss Enterprise Application Platform 8keycloak-servicesFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packkeycloak-servicesFix deferred
Red Hat Single Sign-On 7keycloak-servicesFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2451611org.keycloak.protocol.oidc.grants: org.keycloak.services.managers: Keycloak: Server-Side Request Forgery via OIDC token endpoint manipulation

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
nvd
14 дней назад

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.

CVSS3: 3.1
debian
14 дней назад

A flaw was found in Keycloak. An authenticated attacker can perform Se ...

CVSS3: 3.1
github
14 дней назад

Keycloak Server-Side Request Forgery via OIDC token endpoint manipulation

3.1 Low

CVSS3