CVE-2024-1132

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
redhatCNA
8.1 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
VendorProductVersion
redhatbuild_of_keycloak
-
redhatjboss_middleware_text-only_advisories
1.0
redhatkeycloak
21.1.0 ≤
𝑥
< 22.0.10
redhatkeycloak
23.0.0 ≤
𝑥
< 24.0.3
redhatmigration_toolkit_for_applications
1.0
redhatmigration_toolkit_for_runtimes
-
redhatopenshift_container_platform
4.11
redhatopenshift_container_platform
4.12
redhatopenshift_container_platform_for_ibm_z
4.9
redhatopenshift_container_platform_for_ibm_z
4.10
redhatopenshift_container_platform_for_linuxone
4.9
redhatopenshift_container_platform_for_linuxone
4.10
redhatopenshift_container_platform_for_power
4.9
redhatopenshift_container_platform_for_power
4.10
redhatsingle_sign-on
-
redhatsingle_sign-on
7.6
𝑥
= Vulnerable software versions