2.7

CVE-2024-5967

Keycloak: leak of configured ldap bind credentials through the keycloak admin console

Leak of configured LDAP bind credentials through the Keycloak admin console

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
Mögliche Gegenmaßnahme
Keycloak Server: Install latest version
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
Paket keycloak
Default Statusunaffected
Version 0
Version < 22.0.12
Status affected
Version 23.0.0
Version < 24.0.6
Status affected
Version 25.0.0
Version < 25.0.1
Status affected
HerstellerRed Hat
Produkt Red Hat Build of Keycloak
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version 22.0.12-1
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version 22-17
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version 22-20
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat Single Sign-On 7
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat Single Sign-On 7.6 for RHEL 7
Default Statusaffected
Version 0:18.0.16-1.redhat_00001.1.el7sso
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat Single Sign-On 7.6 for RHEL 8
Default Statusaffected
Version 0:18.0.16-1.redhat_00001.1.el8sso
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat Single Sign-On 7.6 for RHEL 9
Default Statusaffected
Version 0:18.0.16-1.redhat_00001.1.el9sso
Version < *
Status unaffected
HerstellerRed Hat
Produkt RHEL-8 based Middleware Containers
Default Statusaffected
Version 7.6-52
Version < *
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemKeycloak
Produkt Keycloak Server
Version >= 0.0.0, < 22.0.12
Version >= 24.0.0, < 24.0.6
Version >= 25.0.0, < 25.0.1
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.258
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secalert@redhat.com 2.7 1.2 1.4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CWE-276 Incorrect Default Permissions

During installation, installed file permissions are set to allow anyone to modify those files.