Server-Side Request Forgery (SSRF) Affecting org.keycloak:keycloak-services package, versions [,12.0.2)
Threat Intelligence
Exploit Maturity
Mature
EPSS
20.04% (97th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGKEYCLOAK-1924605
- published 26 Nov 2020
- disclosed 26 Nov 2020
- credit Lauritz Holtmann
Introduced: 26 Nov 2020
CVE-2020-10770 Open this link in a new tabHow to fix?
Upgrade org.keycloak:keycloak-services
to version 12.0.2 or higher.
Overview
org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) via request_uri
, using OIDC parameter which can force the server to call out an unverified URL.
CVSS Scores
version 3.1