Bug 2262117 (CVE-2024-1132)

Summary: CVE-2024-1132 keycloak: path transversal in redirection validation
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aileenc, anstephe, asoldano, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, clement.escoffier, dandread, darran.lofthouse, dhanak, dkreling, dosoudil, dpalmer, drichtar, ecerquei, eric.wittmann, fjuma, gmalinko, gsmet, ibek, ivassile, iweiss, janstey, jmartisk, jrokos, jross, jwon, kverlaen, lgao, lthon, max.andersen, mnovotny, mosmerov, msochure, mstefank, msvehla, mulliken, nwallace, olubyans, pantinor, pdelbell, pdrozd, peholase, pgallagh, pjindal, pmackay, probinso, pskopek, rguimara, rjohnson, rkieley, rowaters, rruss, rstancel, rsvoboda, sausingh, sbiarozk, security-response-team, smaestri, sthorger, tom.jenkinson, tqvarnst
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: keycloak 22.0.10, keycloak 24.0.3, rhbk 22.0.10, rhsso 7.6.8 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2262114    

Description Patrick Del Bello 2024-01-31 17:07:03 UTC
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.

Version affected: Keycloak >= 21.1.0. Red Hat Build of Keycloak affected since beginning. Red Hat Single Sign-On affected since 7.6.5

Comment 8 errata-xmlrpc 2024-04-16 19:52:22 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.6 for RHEL 7

Via RHSA-2024:1860 https://access.redhat.com/errata/RHSA-2024:1860

Comment 9 errata-xmlrpc 2024-04-16 19:52:36 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.6 for RHEL 8

Via RHSA-2024:1861 https://access.redhat.com/errata/RHSA-2024:1861

Comment 10 errata-xmlrpc 2024-04-16 19:52:53 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.6 for RHEL 9

Via RHSA-2024:1862 https://access.redhat.com/errata/RHSA-2024:1862

Comment 11 errata-xmlrpc 2024-04-16 19:54:24 UTC
This issue has been addressed in the following products:

  RHEL-8 based Middleware Containers

Via RHSA-2024:1864 https://access.redhat.com/errata/RHSA-2024:1864

Comment 12 errata-xmlrpc 2024-04-16 20:04:37 UTC
This issue has been addressed in the following products:

  RHSSO 7.6.8

Via RHSA-2024:1866 https://access.redhat.com/errata/RHSA-2024:1866

Comment 13 errata-xmlrpc 2024-04-16 20:26:31 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 22.0.10

Via RHSA-2024:1868 https://access.redhat.com/errata/RHSA-2024:1868

Comment 14 errata-xmlrpc 2024-04-16 20:26:51 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 22

Via RHSA-2024:1867 https://access.redhat.com/errata/RHSA-2024:1867

Comment 16 errata-xmlrpc 2024-05-21 14:18:49 UTC
This issue has been addressed in the following products:

  Red Hat JBoss AMQ

Via RHSA-2024:2945 https://access.redhat.com/errata/RHSA-2024:2945

Comment 17 errata-xmlrpc 2024-06-10 12:02:59 UTC
This issue has been addressed in the following products:

  Red Hat JBoss AMQ

Via RHSA-2024:3752 https://access.redhat.com/errata/RHSA-2024:3752

Comment 18 errata-xmlrpc 2024-06-10 14:20:36 UTC
This issue has been addressed in the following products:

  Red Hat JBoss AMQ

Via RHSA-2024:3762 https://access.redhat.com/errata/RHSA-2024:3762

Comment 19 errata-xmlrpc 2024-06-13 11:38:35 UTC
This issue has been addressed in the following products:

  Migration Toolkit for Runtimes 1 on RHEL 8

Via RHSA-2024:3919 https://access.redhat.com/errata/RHSA-2024:3919

Comment 20 errata-xmlrpc 2024-06-20 00:36:02 UTC
This issue has been addressed in the following products:

  MTA-6.2-RHEL-9
  MTA-6.2-RHEL-8

Via RHSA-2024:3989 https://access.redhat.com/errata/RHSA-2024:3989