Vulnerability identifier: #VU16030
Vulnerability risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-601
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Keycloak
Server applications /
Directory software, identity management
Vendor: Keycloak
Description
The vulnerability allows a remote unauthenticated attacker to redirect the target user to external websites.
The weakness exists due to the Redirect URL for both Login and Logout are not normalized in org.keycloak.protocol.oidc.utils.RedirectUtils before the redirect url is verified. A remote attacker can trick the victim into visiting a specially crafted website and redirect users to malicious website.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Keycloak: 3.2.1
External links
http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14658
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.