keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-7628 keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
Github GHSA Github GHSA GHSA-g8q8-fggx-9r3q Keycloak vulnerable to path traversal via double URL encoding
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 09 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-04-09T13:42:27.268Z

Reserved: 2022-10-31T20:17:27.732Z

Link: CVE-2022-3782

cve-icon Vulnrichment

Updated: 2024-08-03T01:20:57.802Z

cve-icon NVD

Status : Modified

Published: 2023-01-13T06:15:11.187

Modified: 2025-04-09T14:15:24.100

Link: CVE-2022-3782

cve-icon Redhat

Severity : Important

Publid Date: 2022-12-12T00:00:00Z

Links: CVE-2022-3782 - Bugzilla

cve-icon OpenCVE Enrichment

No data.