Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46512
HistoryApr 18, 2024 - 10:19 a.m.

Authorization Bypass

2024-04-1810:19:01
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
16
keycloak
authorization bypass
regular expression
dynamic client registration
trusteddomain

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

AI Score

5.8

Confidence

Low

EPSS

0

Percentile

13.0%

keycloak is vulnerable to Authorization Bypass. The vulnerability is due to a hardcoded permissive regular expression which is used to filtering allowed hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an environment with specific Dynamic Client Registration with TrustedDomain configuration previously unauthorized.

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

AI Score

5.8

Confidence

Low

EPSS

0

Percentile

13.0%