Description
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jh7q-5mwf-qvhw | Keycloak vulnerable to Server-Side Request Forgery |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:15.437Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10770
No data.
Status : Modified
Published: 2020-12-15T20:15:14.853
Modified: 2024-11-21T04:56:02.113
Link: CVE-2020-10770
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA