Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-g4gc-rh26-m3p5: Keycloak Open Redirect vulnerability

An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believing that the URL is safe, when, in fact, it redirects to a malicious server. This issue can result in a victim inadvertently trusting the destination of the redirect, potentially leading to a successful phishing attack or other types of attacks.

Once a crafted URL is made, it can be sent to a Keycloak admin via email for example. This will trigger this vulnerability when the user visits the page and clicks the link. A malicious actor can use this to target users they know are Keycloak admins for further attacks. It may also be possible to bypass other domain-related security checks, such as supplying this as a OAuth redirect uri. The malicious actor can further obfuscate the redirect_uri using URL encoding, to hide the text of the actual malicious website domain.

ghsa
#vulnerability#web#git#java#oauth#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-7260

Keycloak Open Redirect vulnerability

Moderate severity GitHub Reviewed Published Sep 9, 2024 to the GitHub Advisory Database • Updated Sep 9, 2024

Package

maven org.keycloak:keycloak-core (Maven)

Affected versions

< 24.0.7

An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believing that the URL is safe, when, in fact, it redirects to a malicious server. This issue can result in a victim inadvertently trusting the destination of the redirect, potentially leading to a successful phishing attack or other types of attacks.

Once a crafted URL is made, it can be sent to a Keycloak admin via email for example. This will trigger this vulnerability when the user visits the page and clicks the link. A malicious actor can use this to target users they know are Keycloak admins for further attacks. It may also be possible to bypass other domain-related security checks, such as supplying this as a OAuth redirect uri. The malicious actor can further obfuscate the redirect_uri using URL encoding, to hide the text of the actual malicious website domain.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2024-7260
  • https://access.redhat.com/errata/RHSA-2024:6502
  • https://access.redhat.com/errata/RHSA-2024:6503
  • https://access.redhat.com/security/cve/CVE-2024-7260
  • https://bugzilla.redhat.com/show_bug.cgi?id=2301875

Published to the GitHub Advisory Database

Sep 9, 2024

ghsa: Latest News

GHSA-8fh4-942r-jf2g: LibreNMS has a Stored XSS ('Cross-site Scripting') in librenms/includes/html/pages/device/services.inc.php