2.7
CVE-2024-5967
- EPSS 0.09%
- Published 18.06.2024 12:15:12
- Last modified 21.11.2024 09:48:39
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
≫
Package
keycloak
Default Statusunaffected
Version <
22.0.12
Version
0
Status
affected
Version <
24.0.6
Version
23.0.0
Status
affected
Version <
25.0.1
Version
25.0.0
Status
affected
VendorRed Hat
≫
Product
Red Hat Build of Keycloak
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 22
Default Statusaffected
Version <
*
Version
22.0.12-1
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 22
Default Statusaffected
Version <
*
Version
22-17
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 22
Default Statusaffected
Version <
*
Version
22-20
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Single Sign-On 7
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Single Sign-On 7.6 for RHEL 7
Default Statusaffected
Version <
*
Version
0:18.0.16-1.redhat_00001.1.el7sso
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Single Sign-On 7.6 for RHEL 8
Default Statusaffected
Version <
*
Version
0:18.0.16-1.redhat_00001.1.el8sso
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Single Sign-On 7.6 for RHEL 9
Default Statusaffected
Version <
*
Version
0:18.0.16-1.redhat_00001.1.el9sso
Status
unaffected
VendorRed Hat
≫
Product
RHEL-8 based Middleware Containers
Default Statusaffected
Version <
*
Version
7.6-52
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.09% | 0.259 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 2.7 | 1.2 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
|
CWE-276 Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.