URL Redirection to Untrusted Site ('Open Redirect') Affecting org.keycloak:keycloak-server-spi-private package, versions [,22.0.13) [23.0.0,24.0.8) [25.0.0,25.0.6)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.74% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGKEYCLOAK-8061810
  • published 20 Sep 2024
  • disclosed 19 Sep 2024
  • credit Karsten Meyer zu Selhausen, Niklas Conrad

How to fix?

Upgrade org.keycloak:keycloak-server-spi-private to version 22.0.13, 24.0.8, 25.0.6 or higher.

Overview

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to URL Redirection to Untrusted Site ('Open Redirect') due to a misconfiguration flaw in the validation of redirect URIs. An attacker can redirect users to an arbitrary URL and potentially expose sensitive information such as authorization codes, leading to session hijacking.

Note: This is only exploitable if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
7.6 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    Present
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Passive
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None