logo

CVE-2024-10492 org.keycloak:keycloak-quarkus-server

Package

Manager: maven
Name: org.keycloak:keycloak-quarkus-server
Vulnerable Version: >=0 <26.0.6 || >=25.0.0 <26.0.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00036 pctl0.08895

Details

Keycloak Path Traversal Vulnerability Due to External Control of File Name or Path A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.

Metadata

Created: 2024-11-25T18:37:14Z
Modified: 2024-11-25T18:37:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-5545-r4hg-rj4m/GHSA-5545-r4hg-rj4m.json
CWE IDs: ["CWE-73"]
Alternative ID: GHSA-5545-r4hg-rj4m
Finding: F063
Auto approve: 1