Lucene search

K
githubGitHub Advisory DatabaseGHSA-J628-Q885-8GR5
HistoryApr 17, 2024 - 6:24 p.m.

Keycloak vulnerable to log Injection during WebAuthn authentication or registration

2024-04-1718:24:03
CWE-117
GitHub Advisory Database
github.com
9
keycloak
log injection
webauthn
authentication
security
issue

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

17.1%

A flaw was found in keycloak 22.0.5. Errors in browser client during setup/auth with “Security Key login” (WebAuthn) are written into the form, send to Keycloak and logged without escaping allowing log injection.

Acknowledgements:
Special thanks toTheresa Henze for reporting this issue and helping us improve our security.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
VendorProductVersionCPE
org.keycloak\keycloakservicescpe:2.3:a:org.keycloak\:keycloak:services:*:*:*:*:*:*:*:*

References

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

17.1%