CVE-2024-10492: Keycloak-quarkus-server: keycloak path trasversal

Description

A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.

Classification

CVE ID: CVE-2024-10492

Affected Products

Vendor: Red Hat

Product: Red Hat build of Keycloak 24

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 12.38% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://access.redhat.com/errata/RHSA-2024:10175
https://access.redhat.com/errata/RHSA-2024:10176
https://access.redhat.com/errata/RHSA-2024:10177
https://access.redhat.com/errata/RHSA-2024:10178
https://access.redhat.com/security/cve/CVE-2024-10492
https://bugzilla.redhat.com/show_bug.cgi?id=2322447

Timeline