First published: Tue Oct 29 2024(Updated: )
A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. In Keycloak 24.0.8, a vulnerability allows unauthorized file access through path traversal in file vault configurations due to permissive regex validation. This weakness allows reading any file to the Keycloak server, but the admin user will not be able to access the contents unless they have also compromised the remote system that the password/secret is intended to be sent to. In practical terms, the only information leaked to the admin user is the existence of the file. Version affected: <= 26.0.2
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Keycloak | <=26.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2322447 is considered high due to the potential unauthorized access to sensitive information.
To fix REDHAT-BUG-2322447, update Keycloak to the latest version beyond 26.0.2, where the vulnerability has been addressed.
REDHAT-BUG-2322447 affects Keycloak versions up to and including 26.0.2.
The vulnerability in REDHAT-BUG-2322447 involves unauthorized file access through path traversal in file vault configurations.
Users with high privileges in Keycloak may be impacted by REDHAT-BUG-2322447, as they could potentially read sensitive information from vault files.