Redhat

Keycloak

128 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 08:15:10
  • Zuletzt bearbeitet 25.11.2024 08:15:10

A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP valu...

  • EPSS 0.08%
  • Veröffentlicht 25.11.2024 08:15:08
  • Zuletzt bearbeitet 25.11.2024 08:15:08

A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform res...

  • EPSS 0.09%
  • Veröffentlicht 25.11.2024 08:15:07
  • Zuletzt bearbeitet 25.11.2024 08:15:07

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keyclo...

  • EPSS 0.09%
  • Veröffentlicht 25.11.2024 08:15:03
  • Zuletzt bearbeitet 25.11.2024 08:15:03

A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.

  • EPSS 0.06%
  • Veröffentlicht 17.11.2024 11:15:05
  • Zuletzt bearbeitet 18.11.2024 17:11:17

A flaw was found in Keycloak. This issue occurs due to improperly enforcing token types when validating signatures locally. This could allow an authenticated attacker to exchange a logout token for an access token and possibly gain access to data out...

  • EPSS 88.29%
  • Veröffentlicht 09.10.2024 19:15:13
  • Zuletzt bearbeitet 23.12.2024 14:15:05

A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breach...

  • EPSS 79.58%
  • Veröffentlicht 19.09.2024 16:15:06
  • Zuletzt bearbeitet 12.12.2024 20:15:22

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signatu...

  • EPSS 0.27%
  • Veröffentlicht 10.09.2024 17:15:15
  • Zuletzt bearbeitet 01.10.2024 14:15:05

A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited,an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute v...

  • EPSS 0.15%
  • Veröffentlicht 09.09.2024 19:15:14
  • Zuletzt bearbeitet 01.10.2024 14:15:06

An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into b...

  • EPSS 1.15%
  • Veröffentlicht 09.09.2024 19:15:14
  • Zuletzt bearbeitet 04.10.2024 12:48:43

A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who ...