Incorrect Default Permissions
CVE-2024-5967
Summary
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. Consequently, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain. The vulnerability affects org.keycloak:keycloak-ldap-federation versions through 22.0.11, 23.0.0 through 24.0.5, and 25.0.0.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- HIGH
- LOW
- NONE
CWE-276 - Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.
References
Advisory Timeline
- Published