A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.
References
Configurations
No configuration.
History
25 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-25 08:15
Updated : 2024-11-25 08:15
NVD link : CVE-2024-10492
Mitre link : CVE-2024-10492
CVE.ORG link : CVE-2024-10492
JSON object : View
Products Affected
No product.
CWE
CWE-73
External Control of File Name or Path