#VU16030 Open redirect in Keycloak


Published: 2018-11-23

Vulnerability identifier: #VU16030

Vulnerability risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-14658

CWE-ID: CWE-601

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Keycloak
Server applications / Directory software, identity management

Vendor: Keycloak

Description
The vulnerability allows a remote unauthenticated attacker to redirect the target user to external websites.

The weakness exists due to the Redirect URL for both Login and Logout are not normalized in org.keycloak.protocol.oidc.utils.RedirectUtils before the redirect url is verified. A remote attacker can trick the victim into visiting a specially crafted website and redirect users to malicious website.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Keycloak: 3.2.1


External links
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14658


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability