First published: Mon Oct 31 2022(Updated: )
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | =20.0.2 | |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00002.1.el7 | 0:18.0.3-1.redhat_00002.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00002.1.el8 | 0:18.0.3-1.redhat_00002.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00002.1.el9 | 0:18.0.3-1.redhat_00002.1.el9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-3782.
The severity of CVE-2022-3782 is critical with a score of 9.1.
CVE-2022-3782 affects Keycloak by allowing attackers to bypass URL validation and potentially access sensitive information.
Versions up to and excluding 20.0.2 of Keycloak are affected by CVE-2022-3782.
To fix CVE-2022-3782, update Keycloak to version 20.0.2 or higher.