Bug 2138971 (CVE-2022-3782)
Summary: | CVE-2022-3782 keycloak: path traversal via double URL encoding | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Chess Hazlett <chazlett> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aboyko, aileenc, alampare, alazarot, anstephe, asoldano, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, clement.escoffier, dandread, darran.lofthouse, dhanak, dkreling, dosoudil, emingora, eric.wittmann, fjuma, ggrzybek, gjospin, gmalinko, gsmet, hamadhan, ibek, ivassile, iweiss, janstey, jmartisk, jpavlik, jrokos, jross, jwon, kverlaen, lbacciot, lgao, lthon, max.andersen, mnovotny, mokumar, mosmerov, mposolda, msochure, msvehla, nwallace, pantinor, pdelbell, pdrozd, peholase, pgallagh, pjindal, pmackay, probinso, pskopek, rguimara, rjohnson, rkieley, rrajasek, rruss, rstancel, rsvoboda, sbiarozk, sdouglas, security-response-team, smaestri, sthorger, tom.jenkinson |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | keycloak 20.0.2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-14 09:48:44 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2138952 |
Description
Chess Hazlett
2022-10-31 19:55:33 UTC
This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 7 Via RHSA-2022:8961 https://access.redhat.com/errata/RHSA-2022:8961 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 8 Via RHSA-2022:8962 https://access.redhat.com/errata/RHSA-2022:8962 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 9 Via RHSA-2022:8963 https://access.redhat.com/errata/RHSA-2022:8963 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6.1 Via RHSA-2022:8965 https://access.redhat.com/errata/RHSA-2022:8965 This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2022:8964 https://access.redhat.com/errata/RHSA-2022:8964 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-3782 @ggrzybek AFAIK it should be RHSSO 7.6.2. This one should be released very soon (probably in February 2023). Related JIRA is https://issues.redhat.com/browse/RHSSO-2318 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 7 Via RHSA-2023:1043 https://access.redhat.com/errata/RHSA-2023:1043 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 8 Via RHSA-2023:1044 https://access.redhat.com/errata/RHSA-2023:1044 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 9 Via RHSA-2023:1045 https://access.redhat.com/errata/RHSA-2023:1045 This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2023:1047 https://access.redhat.com/errata/RHSA-2023:1047 This issue has been addressed in the following products: Red Hat Single Sign-On Via RHSA-2023:1049 https://access.redhat.com/errata/RHSA-2023:1049 This issue has been addressed in the following products: Migration Toolkit for Runtimes 1 on RHEL 8 Via RHSA-2023:1285 https://access.redhat.com/errata/RHSA-2023:1285 This issue has been addressed in the following products: AMQ Broker 7.11.0 Via RHSA-2023:1661 https://access.redhat.com/errata/RHSA-2023:1661 This issue has been addressed in the following products: MTA-6.1-RHEL-8 Via RHSA-2023:2041 https://access.redhat.com/errata/RHSA-2023:2041 This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2023:2135 https://access.redhat.com/errata/RHSA-2023:2135 This issue has been addressed in the following products: AMQ Broker 7.10.3 Via RHSA-2023:3185 https://access.redhat.com/errata/RHSA-2023:3185 This issue has been addressed in the following products: RHINT Service Registry 2.4.3 GA Via RHSA-2023:3815 https://access.redhat.com/errata/RHSA-2023:3815 |