vendor:
Keycloak
by:
Mayank Deshmukh
5.3
CVSS
MEDIUM
Blind Server-Side Request Forgery (SSRF)
918
CWE
Product Name: Keycloak
Affected Version From: versions < 12.0.2
Affected Version To: 12.0.1
Patch Exists: YES
Related CWE: CVE-2020-10770
CPE: a:keycloak:keycloak
Tags: keycloak,ssrf,oast,cve,cve2020,blind,packetstorm,edb
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Nuclei Metadata: {'max-request': 1, 'vendor': 'redhat', 'product': 'keycloak'}
Platforms Tested: Kali Linux
2021
Keycloak 12.0.1 – ‘request_uri ‘ Blind Server-Side Request Forgery (SSRF) (Unauthenticated)
Keycloak 12.0.1 is vulnerable to Blind Server-Side Request Forgery (SSRF) when an unauthenticated user sends a malicious request_uri parameter to the /auth/realms/master/protocol/openid-connect/auth endpoint. This allows an attacker to send requests from the Keycloak server to any other server on the internet.
Mitigation:
Upgrade to Keycloak version 12.0.2 or later.