Keycloak Flaw Allows Attackers to Bypass Validation and Access Sensitive Information
CVE-2024-1132
Key Information:
- Vendor
- Red Hat
- Status
- Vendor
- CVE Published:
- 17 April 2024
Summary
A security vulnerability has been identified in Keycloak, where improper URL validation in redirects could enable an attacker to exploit this flaw. This issue particularly affects clients that utilize wildcards in the Valid Redirect URIs field, which could allow malicious requests to bypass intended restrictions. As a result, sensitive information may be accessed without authorization, potentially leading to further attacks. User interaction is necessary to trigger this vulnerability, making it essential for users and administrators to be informed about securing their implementations of Keycloak.
Affected Version(s)
Migration Toolkit for Runtimes 1 on RHEL 8 1.2-23
Migration Toolkit for Runtimes 1 on RHEL 8 1.2-15
Migration Toolkit for Runtimes 1 on RHEL 8 1.2-16
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved