A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing. | |
Title | Org.keycloak:keycloak-quarkus-server: unrestricted admin use of system and environment variables | |
First Time appeared |
Redhat
Redhat build Keycloak Redhat jboss Enterprise Application Platform Redhat jbosseapxp |
|
Weaknesses | CWE-526 | |
CPEs | cpe:/a:redhat:build_keycloak:26.0 cpe:/a:redhat:build_keycloak:26.0::el9 cpe:/a:redhat:jboss_enterprise_application_platform:8 cpe:/a:redhat:jbosseapxp |
|
Vendors & Products |
Redhat
Redhat build Keycloak Redhat jboss Enterprise Application Platform Redhat jbosseapxp |
|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-15T05:38:20.970Z
Reserved: 2024-11-26T04:36:51.824Z
Link: CVE-2024-11736

Updated: 2025-01-14T14:44:31.729Z

Status : Received
Published: 2025-01-14T09:15:20.750
Modified: 2025-01-14T09:15:20.750
Link: CVE-2024-11736
