A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.
History

Wed, 27 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat red Hat Single Sign On
CPEs cpe:/a:redhat:red_hat_single_sign_on:7
Vendors & Products Redhat red Hat Single Sign On

Mon, 25 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 07:45:00 +0000

Type Values Removed Values Added
Title org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process Org.keycloak:keycloak-quarkus-server: sensitive data exposure in keycloak build process
First Time appeared Redhat jboss Enterprise Application Platform
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8
Vendors & Products Redhat jboss Enterprise Application Platform
References

Fri, 22 Nov 2024 14:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.
Title org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-798
CPEs cpe:/a:redhat:build_keycloak:24
cpe:/a:redhat:build_keycloak:24::el9
cpe:/a:redhat:build_keycloak:26
cpe:/a:redhat:build_keycloak:26.0::el9
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-11-25T07:37:05.161Z

Updated: 2024-11-27T20:51:51.757Z

Reserved: 2024-10-28T07:34:31.748Z

Link: CVE-2024-10451

cve-icon Vulnrichment

Updated: 2024-11-25T16:00:22.798Z

cve-icon NVD

Status : Received

Published: 2024-11-25T08:15:07.900

Modified: 2024-11-25T08:15:07.900

Link: CVE-2024-10451

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-21T16:55:00Z

Links: CVE-2024-10451 - Bugzilla