Lucene search

K
githubGitHub Advisory DatabaseGHSA-MRV8-PQFJ-7GP5
HistoryApr 17, 2024 - 5:31 p.m.

Keycloak path traversal vulnerability in the redirect validation

2024-04-1717:31:12
CWE-346
CWE-601
GitHub Advisory Database
github.com
18
keycloak
path traversal
vulnerability
redirect validation
bypass
allowed hosts
software

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%

An issue was found in the redirect_uri validation logic that allows for a bypass of otherwise explicitly allowed hosts.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%