Keycloak Path Traversal Vulnerability Due to External Control of File Name or Path
Moderate severity
GitHub Reviewed
Published
Nov 25, 2024
in
keycloak/keycloak
•
Updated Nov 25, 2024
Package
Affected versions
< 24.0.9
>= 25.0.0, < 26.0.6
Patched versions
26.0.6
26.0.6
Description
Published to the GitHub Advisory Database
Nov 25, 2024
Reviewed
Nov 25, 2024
Last updated
Nov 25, 2024
A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.
References