CVE-2017-2582
26.07.2018, 17:29
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | keycloak | 𝑥 < 2.5.1 |
redhat | jboss_enterprise_application_platform | 6.0.0 |
redhat | jboss_enterprise_application_platform | 6.4.0 |
redhat | jboss_enterprise_application_platform | 7.0.0 |
redhat | jboss_enterprise_application_platform | 7.1.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-201 - Insertion of Sensitive Information Into Sent DataThe code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
References