Keycloak

Keycloak

32 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 18.06.2024 12:15:12
  • Zuletzt bearbeitet 21.11.2024 09:48:39

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-r...

  • EPSS 0.52%
  • Veröffentlicht 03.06.2024 16:15:08
  • Zuletzt bearbeitet 21.11.2024 09:43:04

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authori...

  • EPSS 0.09%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:44:24

A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow...

  • EPSS 0.3%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:44:03

A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardiz...

  • EPSS 0.07%
  • Veröffentlicht 17.04.2024 14:15:08
  • Zuletzt bearbeitet 21.11.2024 09:09:42

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other ...

  • EPSS 0.13%
  • Veröffentlicht 17.04.2024 14:15:08
  • Zuletzt bearbeitet 08.07.2025 14:15:24

A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the ...

  • EPSS 0.21%
  • Veröffentlicht 17.04.2024 14:15:07
  • Zuletzt bearbeitet 30.06.2025 13:58:57

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...

  • EPSS 0.28%
  • Veröffentlicht 21.02.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:08:57

It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, ...

  • EPSS 0.8%
  • Veröffentlicht 29.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.

  • EPSS 0.59%
  • Veröffentlicht 26.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible information disclosure or further attacks.