Lucene search

K
githubGitHub Advisory DatabaseGHSA-72VP-XFRC-42XM
HistoryApr 17, 2024 - 6:25 p.m.

Keycloak path transversal vulnerability in redirection validation

2024-04-1718:25:08
CWE-22
GitHub Advisory Database
github.com
14
keycloak
path transversal
redirection validation
malicious request
sensitive information
wildcard
axel flamcourt
vulnerability

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

7.9 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.

Acknowledgements:

Special thanks to Axel Flamcourt for reporting this issue and helping us improve our project.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

7.9 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%