CVE-2024-5967
- EPSS 0.14%
- Veröffentlicht 18.06.2024 12:15:12
- Zuletzt bearbeitet 21.11.2024 09:48:39
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-r...
CVE-2023-4727
- EPSS 0.05%
- Veröffentlicht 11.06.2024 20:15:09
- Zuletzt bearbeitet 21.11.2024 08:35:50
A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory s...
CVE-2024-4540
- EPSS 0.81%
- Veröffentlicht 03.06.2024 16:15:08
- Zuletzt bearbeitet 21.11.2024 09:43:04
A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authori...
CVE-2024-1102
- EPSS 0.15%
- Veröffentlicht 25.04.2024 17:15:47
- Zuletzt bearbeitet 24.10.2025 12:15:36
A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.
CVE-2023-6544
- EPSS 0.39%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 21.11.2024 08:44:03
A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardiz...
CVE-2023-6787
- EPSS 0.42%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 30.06.2025 13:49:15
A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "p...
CVE-2023-6484
- EPSS 0.44%
- Veröffentlicht 25.04.2024 16:15:09
- Zuletzt bearbeitet 21.11.2024 08:43:56
A log injection flaw was found in Keycloak. A text string may be injected through the authentication form when using the WebAuthn authentication mode. This issue may have a minor impact to the logs integrity.
- EPSS 0.09%
- Veröffentlicht 25.04.2024 13:15:50
- Zuletzt bearbeitet 21.11.2024 08:17:38
A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along w...
CVE-2024-2419
- EPSS 0.07%
- Veröffentlicht 17.04.2024 14:15:08
- Zuletzt bearbeitet 21.11.2024 09:09:42
A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other ...
CVE-2024-1132
- EPSS 0.24%
- Veröffentlicht 17.04.2024 14:15:07
- Zuletzt bearbeitet 30.06.2025 13:58:57
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...