Keycloak Flaw Allows Attackers to Bypass Validation and Access Sensitive Information
CVE-2024-1132

8.1HIGH

Summary

A security vulnerability has been identified in Keycloak, where improper URL validation in redirects could enable an attacker to exploit this flaw. This issue particularly affects clients that utilize wildcards in the Valid Redirect URIs field, which could allow malicious requests to bypass intended restrictions. As a result, sensitive information may be accessed without authorization, potentially leading to further attacks. User interaction is necessary to trigger this vulnerability, making it essential for users and administrators to be informed about securing their implementations of Keycloak.

Affected Version(s)

Migration Toolkit for Runtimes 1 on RHEL 8 1.2-23

Migration Toolkit for Runtimes 1 on RHEL 8 1.2-15

Migration Toolkit for Runtimes 1 on RHEL 8 1.2-16

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank Axel Flamcourt for reporting this issue.
.