Логотип exploitDog
bind:CVE-2024-10451
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10451

Количество 5

Количество 5

redhat логотип

CVE-2024-10451

около 1 года назад

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-10451

около 1 года назад

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2024-10451

около 1 года назад

A flaw was found in Keycloak. This issue occurs because sensitive runt ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-v7gv-xpgf-6395

около 1 года назад

Keycloak Build Process Exposes Sensitive Data

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2024-10706

больше 1 года назад

Уязвимость программного средства для управления идентификацией и доступом Keycloak, связанная с использованием предустановленных учетных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-10451

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.

CVSS3: 5.9
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-10451

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.

CVSS3: 5.9
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-10451

A flaw was found in Keycloak. This issue occurs because sensitive runt ...

CVSS3: 5.9
0%
Низкий
около 1 года назад
github логотип
GHSA-v7gv-xpgf-6395

Keycloak Build Process Exposes Sensitive Data

CVSS3: 5.9
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-10706

Уязвимость программного средства для управления идентификацией и доступом Keycloak, связанная с использованием предустановленных учетных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
0%
Низкий
больше 1 года назад

Уязвимостей на страницу