Lucene search

K
redhatcveRedhat.comRH:CVE-2024-1132
HistoryApr 17, 2024 - 1:02 p.m.

CVE-2024-1132

2024-04-1713:02:33
redhat.com
access.redhat.com
12
keycloak
url validation
security bypass
sensitive information
wildcard
client
user interaction

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.2%

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.

Mitigation

No current mitigation is available for this vulnerability.

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.2%