Description
A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an environment with this specific Dynamic Client Registration and TrustedDomain configuration previously unauthorized.
No analysis available yet.
Remediation
Vendor Workaround
No mitigation is currently available for this flaw.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1087 | A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an environment with this specific Dynamic Client Registration and TrustedDomain configuration previously unauthorized. |
Github GHSA |
GHSA-46c8-635v-68r2 | Keycloak Authorization Bypass vulnerability |
References
History
Sun, 24 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-11T15:57:26.470Z
Reserved: 2023-12-06T05:42:36.249Z
Link: CVE-2023-6544
Updated: 2024-08-02T08:35:14.454Z
Status : Awaiting Analysis
Published: 2024-04-25T16:15:10.097
Modified: 2024-11-21T08:44:03.880
Link: CVE-2023-6544
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA