logo

CVE-2024-5967 org.keycloak:keycloak-ldap-federation

Package

Manager: maven
Name: org.keycloak:keycloak-ldap-federation
Vulnerable Version: =25.0.0 || >=25.0.0 <25.0.1 || >=0 <22.0.12 || >=23.0.0 <24.0.6

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00087 pctl0.25955

Details

Keycloak leaks configured LDAP bind credentials through the Keycloak admin console ### Impact The LDAP testing endpoint allows to change the Connection URL independently of and without having to re-enter the currently configured LDAP bind credentials. An attacker with admin access (permission manage-realm) can change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console/compromised a user with sufficient privileges can leak domain credentials and can now attack the domain. ### Acknowledgements Special thanks to Simon Wessling for reporting this issue and helping us improve our project

Metadata

Created: 2024-06-21T15:52:38Z
Modified: 2024-07-01T14:39:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-c25h-c27q-5qpv/GHSA-c25h-c27q-5qpv.json
CWE IDs: ["CWE-276"]
Alternative ID: GHSA-c25h-c27q-5qpv
Finding: F056
Auto approve: 1