Configuration Vulnerability in Keycloak Affects Sensitive Server Information
CVE-2024-11736

4.9MEDIUM

Summary

A configuration exposure vulnerability has been identified in Keycloak that allows admin users to access sensitive server environment variables and system properties through crafted user-configurable URLs. By manipulating backchannel logout URLs or admin URLs using placeholders like ${env.VARNAME} or ${PROPNAME}, administrators can inadvertently disclose critical server information, as the server processes and substitutes these placeholders with their actual values. This vulnerability poses a significant risk, particularly if the exposed variables contain sensitive data.

Affected Version(s)

Red Hat build of Keycloak 26.0 26.0.8-1

Red Hat build of Keycloak 26.0 26.0-7

Red Hat build of Keycloak 26.0 26.0-8

References

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was discovered by Steven Hawkins (Red Hat).
.