Vulnerability Description
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Build Of Keycloak | - |
| Redhat | Jboss Middleware Text-Only Advisories | 1.0 |
| Redhat | Keycloak | >= 21.1.0, < 22.0.10 |
| Redhat | Migration Toolkit For Applications | 1.0 |
| Redhat | Migration Toolkit For Runtimes | - |
| Redhat | Openshift Container Platform | 4.11 |
| Redhat | Openshift Container Platform For Ibm Z | 4.9 |
| Redhat | Openshift Container Platform For Linuxone | 4.9 |
| Redhat | Openshift Container Platform For Power | 4.9 |
| Redhat | Single Sign-On | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:1860Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:1861Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:1862Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:1864Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:1866Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:1867Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:1868Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:2945Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3752Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3762Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3919Vendor Advisory
- https://access.redhat.com/errata/RHSA-2024:3989Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2024-1132Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2262117Issue TrackingVendor Advisory
- https://access.redhat.com/errata/RHSA-2024:1860Vendor Advisory
FAQ
What is CVE-2024-1132?
CVE-2024-1132 is a vulnerability with a CVSS score of 8.1 (HIGH). A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other...
How severe is CVE-2024-1132?
CVE-2024-1132 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1132?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Build Of Keycloak, Redhat Jboss Middleware Text-Only Advisories, Redhat Keycloak, Redhat Migration Toolkit For Applications, Redhat Migration Toolkit For Runtimes.