First published: Thu Jun 13 2024(Updated: )
The LDAP testing endpoint allows to change the Connection URL independently of and without having to re-enter the currently configured LDAP bind credentials. An attacker with admin access (permission manage-realm) can change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console/compromised a user with sufficient privileges can leak domain credentials and can now attack the domain. This requires: Access to the REST endpoint and the admin user needed with manage-realm permission (full access to LDAP configuration and all identity providers). Version affected: <= 24.0.5
Affected Software | Affected Version | How to fix |
---|---|---|
Keycloak Authenticator | <=24.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2292200 is considered critical due to the risk of unauthorized access to LDAP configurations.
To fix REDHAT-BUG-2292200, update to the latest version of Keycloak that includes the security patches addressing this vulnerability.
REDHAT-BUG-2292200 affects all installations of Keycloak versions up to and including 24.0.5.
The potential impact of REDHAT-BUG-2292200 includes the ability for an attacker to redirect LDAP connections, potentially leading to data exposure.
Currently, the recommended action for REDHAT-BUG-2292200 is to apply the security updates rather than relying on a workaround.