In Keycloak prior to 24.0.5, users with low privileges (just plain users in the realm) are able to utilize administrative functionalities within Keycloak admin interface. This issue presents a significant security risk as it allows unauthorized users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(200516);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/17");
script_cve_id("CVE-2024-3656");
script_xref(name:"IAVB", value:"2024-B-0079");
script_name(english:"Keycloak < 24.0.5 Unauthorized Access (CVE-2024-3656)");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"In Keycloak prior to 24.0.5, users with low privileges (just plain users in the realm) are able to utilize
administrative functionalities within Keycloak admin interface. This issue presents a significant security risk as it
allows unauthorized users to perform actions reserved for administrators, potentially leading to data breaches or
system compromise.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://github.com/advisories/GHSA-2cww-fgmg-4jqc");
script_set_attribute(attribute:"solution", value:
"Upgrade Keycloak to 24.0.5 or later.");
script_set_attribute(attribute:"agent", value:"unix");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-3656");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/06/11");
script_set_attribute(attribute:"patch_publication_date", value:"2024/06/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/06/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:keycloak:keycloak");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "command_builder_init.nasl", "keycloak_nix_installed.nbin");
script_require_keys("Host/local_checks_enabled", "Host/uname");
exit(0);
}
include('vcf.inc');
var app_info = vcf::get_app_info(app:'Keycloak');
var constraints = [
{'fixed_version': '24.0.5'}
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);