Headline
GHSA-f4v7-3mww-9gc2: Keycloak allows unrestricted admin use of system and environment variables
A security vulnerability has been identified that allows admin users to access sensitive server environment variables and system properties through user-configurable URLs. Specifically, when configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-11736
Keycloak allows unrestricted admin use of system and environment variables
Moderate severity GitHub Reviewed Published Jan 13, 2025 in keycloak/keycloak • Updated Jan 13, 2025
Package
maven org.keycloak:keycloak-quarkus-server (Maven)
Affected versions
< 26.0.8
A security vulnerability has been identified that allows admin users to access sensitive server environment variables and system properties through user-configurable URLs. Specifically, when configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
References
- GHSA-f4v7-3mww-9gc2
- keycloak/keycloak@7a76858
Published to the GitHub Advisory Database
Jan 13, 2025
Last updated
Jan 13, 2025