2.7
CVE-2024-5967
- EPSS 0.09%
- Veröffentlicht 18.06.2024 12:15:12
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Keycloak: leak of configured ldap bind credentials through the keycloak admin console
Leak of configured LDAP bind credentials through the Keycloak admin console
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.Mögliche Gegenmaßnahme
Keycloak Server: Install latest version
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
≫
Paket
keycloak
Default Statusunaffected
Version
0
Version <
22.0.12
Status
affected
Version
23.0.0
Version <
24.0.6
Status
affected
Version
25.0.0
Version <
25.0.1
Status
affected
HerstellerRed Hat
≫
Produkt
Red Hat Build of Keycloak
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Keycloak 22
Default Statusaffected
Version
22.0.12-1
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Keycloak 22
Default Statusaffected
Version
22-17
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Keycloak 22
Default Statusaffected
Version
22-20
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Single Sign-On 7
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat Single Sign-On 7.6 for RHEL 7
Default Statusaffected
Version
0:18.0.16-1.redhat_00001.1.el7sso
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Single Sign-On 7.6 for RHEL 8
Default Statusaffected
Version
0:18.0.16-1.redhat_00001.1.el8sso
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Single Sign-On 7.6 for RHEL 9
Default Statusaffected
Version
0:18.0.16-1.redhat_00001.1.el9sso
Version <
*
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHEL-8 based Middleware Containers
Default Statusaffected
Version
7.6-52
Version <
*
Status
unaffected
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemKeycloak
≫
Produkt
Keycloak Server
Version
>= 0.0.0, < 22.0.12
Version
>= 24.0.0, < 24.0.6
Version
>= 25.0.0, < 25.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.258 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 2.7 | 1.2 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
|
CWE-276 Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.