Redhat

Keycloak

136 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 18.06.2024 12:15:12
  • Zuletzt bearbeitet 21.11.2024 09:48:39

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-r...

  • EPSS 0.05%
  • Veröffentlicht 11.06.2024 20:15:09
  • Zuletzt bearbeitet 21.11.2024 08:35:50

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory s...

  • EPSS 0.81%
  • Veröffentlicht 03.06.2024 16:15:08
  • Zuletzt bearbeitet 21.11.2024 09:43:04

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authori...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 25.04.2024 17:15:47
  • Zuletzt bearbeitet 24.10.2025 12:15:36

A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.

  • EPSS 0.39%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:44:03

A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardiz...

  • EPSS 0.42%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 30.06.2025 13:49:15

A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "p...

  • EPSS 0.44%
  • Veröffentlicht 25.04.2024 16:15:09
  • Zuletzt bearbeitet 21.11.2024 08:43:56

A log injection flaw was found in Keycloak. A text string may be injected through the authentication form when using the WebAuthn authentication mode. This issue may have a minor impact to the logs integrity.

  • EPSS 0.09%
  • Veröffentlicht 25.04.2024 13:15:50
  • Zuletzt bearbeitet 21.11.2024 08:17:38

A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along w...

  • EPSS 0.07%
  • Veröffentlicht 17.04.2024 14:15:08
  • Zuletzt bearbeitet 21.11.2024 09:09:42

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other ...

  • EPSS 0.24%
  • Veröffentlicht 17.04.2024 14:15:07
  • Zuletzt bearbeitet 30.06.2025 13:58:57

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...