Keycloak

Keycloak

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 89.11%
  • Veröffentlicht 09.10.2024 19:15:13
  • Zuletzt bearbeitet 23.12.2024 14:15:05

A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breach...

  • EPSS 78%
  • Veröffentlicht 19.09.2024 16:15:06
  • Zuletzt bearbeitet 12.12.2024 20:15:22

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signatu...

  • EPSS 0.14%
  • Veröffentlicht 18.06.2024 12:15:12
  • Zuletzt bearbeitet 21.11.2024 09:48:39

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-r...

  • EPSS 0.79%
  • Veröffentlicht 03.06.2024 16:15:08
  • Zuletzt bearbeitet 21.11.2024 09:43:04

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authori...

  • EPSS 0.09%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:44:24

A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow...

  • EPSS 0.39%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:44:03

A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardiz...

  • EPSS 0.07%
  • Veröffentlicht 17.04.2024 14:15:08
  • Zuletzt bearbeitet 21.11.2024 09:09:42

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other ...

  • EPSS 0.13%
  • Veröffentlicht 17.04.2024 14:15:08
  • Zuletzt bearbeitet 08.07.2025 14:15:24

A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the ...

  • EPSS 0.24%
  • Veröffentlicht 17.04.2024 14:15:07
  • Zuletzt bearbeitet 30.06.2025 13:58:57

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...

  • EPSS 0.28%
  • Veröffentlicht 21.02.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:08:57

It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, ...