GHSA-6vrw-mpj8-3j59 – org.keycloak:keycloak-quarkus-server
Package
Manager: maven
Name: org.keycloak:keycloak-quarkus-server
Vulnerable Version: <0
Severity
Level: Low
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Keycloak Path Traversal Vulnerability Due to External Control of File Name or Path ## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-5545-r4hg-rj4m. This link is maintained to preserve external references. ## Original Description A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.
Metadata
Created: 2024-11-25T09:30:58Z
Modified: 2024-11-25T18:32:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-6vrw-mpj8-3j59/GHSA-6vrw-mpj8-3j59.json
CWE IDs: ["CWE-73"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0