Vulnerabilites related to Red Hat - RHBK 26.0.8
cve-2024-11734
Vulnerability from cvelistv5
Published
2025-01-14 08:35
Modified
2025-03-19 14:52
Summary
A denial of service vulnerability was found in Keycloak that could allow an administrative user with the right to change realm settings to disrupt the service. This action is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that has already been terminated, leading to the failure of said request.
References
https://access.redhat.com/errata/RHSA-2025:0299vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:0300vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-11734vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2328846issue-tracking, x_refsource_REDHAT
Impacted products
Vendor Product Version
Version: 0   
Create a notification for this product.
   Red Hat Red Hat build of Keycloak 26.0 Unaffected: 26.0.8-1   < *
    cpe:/a:redhat:build_keycloak:26.0::el9
Create a notification for this product.
   Red Hat Red Hat build of Keycloak 26.0 Unaffected: 26.0-7   < *
    cpe:/a:redhat:build_keycloak:26.0::el9
Create a notification for this product.
   Red Hat Red Hat build of Keycloak 26.0 Unaffected: 26.0-8   < *
    cpe:/a:redhat:build_keycloak:26.0::el9
Create a notification for this product.
   Red Hat RHBK 26.0.8     cpe:/a:redhat:build_keycloak:26.0
Create a notification for this product.
   Red Hat Red Hat JBoss Enterprise Application Platform 8     cpe:/a:redhat:jboss_enterprise_application_platform:8
Create a notification for this product.
   Red Hat Red Hat JBoss Enterprise Application Platform Expansion Pack     cpe:/a:redhat:jbosseapxp
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-11734",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-14T14:44:48.268163Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-14T14:44:59.365Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://github.com/keycloak/keycloak",
               defaultStatus: "unaffected",
               packageName: "keycloak",
               versions: [
                  {
                     lessThan: "26.0.8",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0::el9",
               ],
               defaultStatus: "affected",
               packageName: "rhbk/keycloak-operator-bundle",
               product: "Red Hat build of Keycloak 26.0",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "26.0.8-1",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0::el9",
               ],
               defaultStatus: "affected",
               packageName: "rhbk/keycloak-rhel9",
               product: "Red Hat build of Keycloak 26.0",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "26.0-7",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0::el9",
               ],
               defaultStatus: "affected",
               packageName: "rhbk/keycloak-rhel9-operator",
               product: "Red Hat build of Keycloak 26.0",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "26.0-8",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0",
               ],
               defaultStatus: "unaffected",
               packageName: "org.keycloak/keycloak-quarkus-server",
               product: "RHBK 26.0.8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
               cpes: [
                  "cpe:/a:redhat:jboss_enterprise_application_platform:8",
               ],
               defaultStatus: "unaffected",
               packageName: "org.keycloak/keycloak-quarkus-server",
               product: "Red Hat JBoss Enterprise Application Platform 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
               cpes: [
                  "cpe:/a:redhat:jbosseapxp",
               ],
               defaultStatus: "unaffected",
               packageName: "org.keycloak/keycloak-quarkus-server",
               product: "Red Hat JBoss Enterprise Application Platform Expansion Pack",
               vendor: "Red Hat",
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Red Hat would like to thank Chase Bowman (Contract Security) for reporting this issue.",
            },
         ],
         datePublic: "2025-01-13T12:22:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "A denial of service vulnerability was found in Keycloak that could allow an administrative user with the right to change realm settings to disrupt the service. This action is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that has already been terminated, leading to the failure of said request.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-693",
                     description: "Protection Mechanism Failure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-19T14:52:05.242Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "RHSA-2025:0299",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2025:0299",
            },
            {
               name: "RHSA-2025:0300",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2025:0300",
            },
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2024-11734",
            },
            {
               name: "RHBZ#2328846",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2328846",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2024-11-26T03:54:23.151000+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2025-01-13T12:22:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Org.keycloak:keycloak-quarkus-server: denial of service in keycloak server via security headers",
         workarounds: [
            {
               lang: "en",
               value: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
            },
         ],
         x_redhatCweChain: "CWE-693: Protection Mechanism Failure",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2024-11734",
      datePublished: "2025-01-14T08:35:42.107Z",
      dateReserved: "2024-11-26T03:57:37.921Z",
      dateUpdated: "2025-03-19T14:52:05.242Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-11736
Vulnerability from cvelistv5
Published
2025-01-14 08:36
Modified
2025-03-19 14:52
Summary
A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
References
https://access.redhat.com/errata/RHSA-2025:0299vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:0300vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-11736vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2328850issue-tracking, x_refsource_REDHAT
Impacted products
Vendor Product Version
Version: 0   
Create a notification for this product.
   Red Hat Red Hat build of Keycloak 26.0 Unaffected: 26.0.8-1   < *
    cpe:/a:redhat:build_keycloak:26.0::el9
Create a notification for this product.
   Red Hat Red Hat build of Keycloak 26.0 Unaffected: 26.0-7   < *
    cpe:/a:redhat:build_keycloak:26.0::el9
Create a notification for this product.
   Red Hat Red Hat build of Keycloak 26.0 Unaffected: 26.0-8   < *
    cpe:/a:redhat:build_keycloak:26.0::el9
Create a notification for this product.
   Red Hat RHBK 26.0.8     cpe:/a:redhat:build_keycloak:26.0
Create a notification for this product.
   Red Hat Red Hat JBoss Enterprise Application Platform 8     cpe:/a:redhat:jboss_enterprise_application_platform:8
Create a notification for this product.
   Red Hat Red Hat JBoss Enterprise Application Platform Expansion Pack     cpe:/a:redhat:jbosseapxp
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-11736",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-14T14:44:22.849777Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-14T14:44:36.417Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://github.com/keycloak/keycloak",
               defaultStatus: "unaffected",
               packageName: "keycloak",
               versions: [
                  {
                     lessThan: "26.0.8",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0::el9",
               ],
               defaultStatus: "affected",
               packageName: "rhbk/keycloak-operator-bundle",
               product: "Red Hat build of Keycloak 26.0",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "26.0.8-1",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0::el9",
               ],
               defaultStatus: "affected",
               packageName: "rhbk/keycloak-rhel9",
               product: "Red Hat build of Keycloak 26.0",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "26.0-7",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://catalog.redhat.com/software/containers/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0::el9",
               ],
               defaultStatus: "affected",
               packageName: "rhbk/keycloak-rhel9-operator",
               product: "Red Hat build of Keycloak 26.0",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "26.0-8",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:build_keycloak:26.0",
               ],
               defaultStatus: "unaffected",
               packageName: "org.keycloak/keycloak-quarkus-server",
               product: "RHBK 26.0.8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
               cpes: [
                  "cpe:/a:redhat:jboss_enterprise_application_platform:8",
               ],
               defaultStatus: "unaffected",
               packageName: "org.keycloak/keycloak-quarkus-server",
               product: "Red Hat JBoss Enterprise Application Platform 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
               cpes: [
                  "cpe:/a:redhat:jbosseapxp",
               ],
               defaultStatus: "unaffected",
               packageName: "org.keycloak/keycloak-quarkus-server",
               product: "Red Hat JBoss Enterprise Application Platform Expansion Pack",
               vendor: "Red Hat",
            },
         ],
         credits: [
            {
               lang: "en",
               value: "This issue was discovered by Steven Hawkins (Red Hat).",
            },
         ],
         datePublic: "2025-01-13T13:24:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-526",
                     description: "Cleartext Storage of Sensitive Information in an Environment Variable",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-19T14:52:27.254Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "RHSA-2025:0299",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2025:0299",
            },
            {
               name: "RHSA-2025:0300",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2025:0300",
            },
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2024-11736",
            },
            {
               name: "RHBZ#2328850",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2328850",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2024-11-26T04:20:40.657000+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2025-01-13T13:24:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Org.keycloak:keycloak-quarkus-server: unrestricted admin use of system and environment variables",
         workarounds: [
            {
               lang: "en",
               value: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
            },
         ],
         x_redhatCweChain: "CWE-526: Cleartext Storage of Sensitive Information in an Environment Variable",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2024-11736",
      datePublished: "2025-01-14T08:36:08.583Z",
      dateReserved: "2024-11-26T04:36:51.824Z",
      dateUpdated: "2025-03-19T14:52:27.254Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}