A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.
Metrics
Affected Vendors & Products
References
History
Wed, 27 Nov 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat red Hat Single Sign On
|
|
CPEs | cpe:/a:redhat:red_hat_single_sign_on:7 | |
Vendors & Products |
Redhat red Hat Single Sign On
|
Mon, 25 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 25 Nov 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process | Org.keycloak:keycloak-quarkus-server: sensitive data exposure in keycloak build process |
First Time appeared |
Redhat jboss Enterprise Application Platform
|
|
CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:8 | |
Vendors & Products |
Redhat jboss Enterprise Application Platform
|
|
References |
|
|
Fri, 22 Nov 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2. | |
Title | org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process | |
First Time appeared |
Redhat
Redhat build Keycloak |
|
Weaknesses | CWE-798 | |
CPEs | cpe:/a:redhat:build_keycloak:24 cpe:/a:redhat:build_keycloak:24::el9 cpe:/a:redhat:build_keycloak:26 cpe:/a:redhat:build_keycloak:26.0::el9 |
|
Vendors & Products |
Redhat
Redhat build Keycloak |
|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-11-25T07:37:05.161Z
Updated: 2024-11-27T20:51:51.757Z
Reserved: 2024-10-28T07:34:31.748Z
Link: CVE-2024-10451
Vulnrichment
Updated: 2024-11-25T16:00:22.798Z
NVD
Status : Received
Published: 2024-11-25T08:15:07.900
Modified: 2024-11-25T08:15:07.900
Link: CVE-2024-10451
Redhat