It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0568 It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
Github GHSA Github GHSA GHSA-c77r-6f64-478q keycloak-core discloses system properties
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T13:55:06.197Z

Reserved: 2016-12-01T00:00:00

Link: CVE-2017-2582

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-26T17:29:00.410

Modified: 2024-11-21T03:23:46.280

Link: CVE-2017-2582

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-09-26T00:00:00Z

Links: CVE-2017-2582 - Bugzilla

cve-icon OpenCVE Enrichment

No data.