Vulnerability Description
keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Keycloak | 20.0.2 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2022-3782Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2022-3782Vendor Advisory
FAQ
What is CVE-2022-3782?
CVE-2022-3782 is a vulnerability with a CVSS score of 9.1 (CRITICAL). keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious ...
How severe is CVE-2022-3782?
CVE-2022-3782 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-3782?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Keycloak.