CVE-2024-1132
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
17/04/2024
Last modified:
30/06/2025
Description
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:* | ||
| cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* | 21.1.0 (including) | 22.0.10 (excluding) |
| cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* | 23.0.0 (including) | 24.0.3 (excluding) |
| cpe:2.3:a:redhat:migration_toolkit_for_applications:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:migration_toolkit_for_runtimes:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:1860
- https://access.redhat.com/errata/RHSA-2024:1861
- https://access.redhat.com/errata/RHSA-2024:1862
- https://access.redhat.com/errata/RHSA-2024:1864
- https://access.redhat.com/errata/RHSA-2024:1866
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/errata/RHSA-2024:2945
- https://access.redhat.com/errata/RHSA-2024:3752
- https://access.redhat.com/errata/RHSA-2024:3762
- https://access.redhat.com/errata/RHSA-2024:3919
- https://access.redhat.com/errata/RHSA-2024:3989
- https://access.redhat.com/security/cve/CVE-2024-1132
- https://bugzilla.redhat.com/show_bug.cgi?id=2262117
- https://access.redhat.com/errata/RHSA-2024:1860
- https://access.redhat.com/errata/RHSA-2024:1861
- https://access.redhat.com/errata/RHSA-2024:1862
- https://access.redhat.com/errata/RHSA-2024:1864
- https://access.redhat.com/errata/RHSA-2024:1866
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/errata/RHSA-2024:2945
- https://access.redhat.com/errata/RHSA-2024:3752
- https://access.redhat.com/errata/RHSA-2024:3762
- https://access.redhat.com/errata/RHSA-2024:3919
- https://access.redhat.com/errata/RHSA-2024:3989
- https://access.redhat.com/security/cve/CVE-2024-1132
- https://bugzilla.redhat.com/show_bug.cgi?id=2262117



