CVE-2024-5967
Keycloak: leak of configured ldap bind credentials through the keycloak admin console
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
Se encontró una vulnerabilidad en Keycloak. El endpoint de prueba LDAP permite cambiar la URL de conexión de forma independiente sin volver a ingresar las credenciales de enlace LDAP configuradas actualmente. Esta falla permite que un atacante con acceso de administrador (permiso de administración de dominio) cambie la URL del host LDAP ("URL de conexión") a una máquina que controla. El servidor Keycloak se conectará al host del atacante e intentará autenticarse con las credenciales configuradas, filtrándoselas así al atacante. Como consecuencia, un atacante que haya comprometido la consola de administración o haya comprometido a un usuario con privilegios suficientes puede filtrar las credenciales del dominio y atacar el dominio.
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-06-13 CVE Reserved
- 2024-06-18 CVE Published
- 2024-09-10 EPSS Updated
- 2024-11-24 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-276: Incorrect Default Permissions
CAPEC
References (9)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-5967 | 2024-06-20 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2292200 | 2024-06-20 | |
https://access.redhat.com/errata/RHSA-2024:6493 | 2024-11-24 | |
https://access.redhat.com/errata/RHSA-2024:6494 | 2024-11-24 | |
https://access.redhat.com/errata/RHSA-2024:6495 | 2024-11-24 | |
https://access.redhat.com/errata/RHSA-2024:6497 | 2024-11-24 | |
https://access.redhat.com/errata/RHSA-2024:6499 | 2024-11-24 | |
https://access.redhat.com/errata/RHSA-2024:6500 | 2024-11-24 | |
https://access.redhat.com/errata/RHSA-2024:6501 | 2024-11-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Build Keycloak Search vendor "Redhat" for product "Build Keycloak" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Keycloak Search vendor "Redhat" for product "Keycloak" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Red Hat Single Sign On Search vendor "Redhat" for product "Red Hat Single Sign On" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Rhosemc Search vendor "Redhat" for product "Rhosemc" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
|