Description

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.

INFO

Published Date :

2024-06-18T12:05:39.289Z

Last Modified :

2026-03-26T23:13:52.275Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2024-5967 vulnerability.

Vendors Products
Redhat
  • Build Keycloak
  • Red Hat Single Sign On
  • Rhosemc

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact