First published: Thu Jan 05 2017(Updated: )
It was found that Picketlink implementation replaces special strings for obtaining attribute values with system property values in SAML messages while parsing. An attacker can misuse this to determine values of system properties at the attacked system by formatting the SAML request ID field to the chosen system property name of his liking, obtaining the property value in "InResponseTo" field in the response. Upstream bug (for Keycloak): <a href="https://issues.jboss.org/browse/KEYCLOAK-4160">https://issues.jboss.org/browse/KEYCLOAK-4160</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-core | <2.5.1 | 2.5.1 |
Red Hat Keycloak | <2.5.1 | |
redhat jboss enterprise application platform | =6.0.0 | |
redhat jboss enterprise application platform | =6.4.0 | |
redhat jboss enterprise application platform | =7.0.0 | |
redhat jboss enterprise application platform | =7.1.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2582 has a moderate severity rating due to potential information disclosure vulnerabilities.
To fix CVE-2017-2582, upgrade to keycloak-core version 2.5.1 or later.
CVE-2017-2582 affects Keycloak versions before 2.5.1 and specific versions of Red Hat JBoss Enterprise Application Platform.
Running a vulnerable version of software related to CVE-2017-2582 could allow attackers to access sensitive system property values.
There is no specific workaround for CVE-2017-2582; upgrading to an unaffected version is the recommended approach.