Headline
GHSA-c25h-c27q-5qpv: Keycloak leaks configured LDAP bind credentials through the Keycloak admin console
Impact
The LDAP testing endpoint allows to change the Connection URL independently of and without having to re-enter the currently configured LDAP bind credentials. An attacker with admin access (permission manage-realm) can change the LDAP host URL (“Connection URL”) to a machine they control. The Keycloak server will connect to the attacker’s host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console/compromised a user with sufficient privileges can leak domain credentials and can now attack the domain.
Acknowledgements
Special thanks to Simon Wessling for reporting this issue and helping us improve our project
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-5967
Keycloak leaks configured LDAP bind credentials through the Keycloak admin console
Low severity GitHub Reviewed Published Jun 21, 2024 in keycloak/keycloak • Updated Jun 21, 2024
Package
maven org.keycloak:keycloak-ldap-federation (Maven)
Affected versions
= 25.0.0
<= 22.0.11
>= 23.0.0, <= 24.0.5
Patched versions
25.0.1
22.0.12
24.0.6
Impact
The LDAP testing endpoint allows to change the Connection URL independently of and without having to re-enter the currently configured LDAP bind credentials. An attacker with admin access (permission manage-realm) can change the LDAP host URL (“Connection URL”) to a machine they control. The Keycloak server will connect to the attacker’s host and try to authenticate with the configured credentials, thus leaking them to the attacker.
As a consequence, an attacker who has compromised the admin console/compromised a user with sufficient privileges can leak domain credentials and can now attack the domain.
Acknowledgements
Special thanks to Simon Wessling for reporting this issue and helping us improve our project
References
- GHSA-c25h-c27q-5qpv
- https://nvd.nist.gov/vuln/detail/CVE-2024-5967
- https://access.redhat.com/security/cve/CVE-2024-5967
- https://bugzilla.redhat.com/show_bug.cgi?id=2292200
Published to the GitHub Advisory Database
Jun 21, 2024
Last updated
Jun 21, 2024
Related news
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.