// For flags

CVE-2024-5967

Keycloak: leak of configured ldap bind credentials through the keycloak admin console

Severity Score

2.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.

Se encontró una vulnerabilidad en Keycloak. El endpoint de prueba LDAP permite cambiar la URL de conexión de forma independiente sin volver a ingresar las credenciales de enlace LDAP configuradas actualmente. Esta falla permite que un atacante con acceso de administrador (permiso de administración de dominio) cambie la URL del host LDAP ("URL de conexión") a una máquina que controla. El servidor Keycloak se conectará al host del atacante e intentará autenticarse con las credenciales configuradas, filtrándoselas así al atacante. Como consecuencia, un atacante que haya comprometido la consola de administración o haya comprometido a un usuario con privilegios suficientes puede filtrar las credenciales del dominio y atacar el dominio.

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.

*Credits: Upstream acknowledges Simon Wessling as the original reporter.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Multiple
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-06-13 CVE Reserved
  • 2024-06-18 CVE Published
  • 2024-09-10 EPSS Updated
  • 2024-11-24 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-276: Incorrect Default Permissions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Build Keycloak
Search vendor "Redhat" for product "Build Keycloak"
*-
Affected
Redhat
Search vendor "Redhat"
Keycloak
Search vendor "Redhat" for product "Keycloak"
*-
Affected
Redhat
Search vendor "Redhat"
Red Hat Single Sign On
Search vendor "Redhat" for product "Red Hat Single Sign On"
*-
Affected
Redhat
Search vendor "Redhat"
Rhosemc
Search vendor "Redhat" for product "Rhosemc"
*-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
*-
Affected