Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-2011 | A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain. |
![]() |
GHSA-c25h-c27q-5qpv | Keycloak leaks configured LDAP bind credentials through the Keycloak admin console |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 27 Sep 2024 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 09 Sep 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhosemc
|
|
CPEs | cpe:/a:redhat:build_keycloak:22::el9 cpe:/a:redhat:red_hat_single_sign_on:7.6 cpe:/a:redhat:red_hat_single_sign_on:7.6::el7 cpe:/a:redhat:red_hat_single_sign_on:7.6::el8 cpe:/a:redhat:red_hat_single_sign_on:7.6::el9 cpe:/a:redhat:rhosemc:1.0::el8 |
|
Vendors & Products |
Redhat rhosemc
|
|
References |
|
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-12T20:11:17.546Z
Reserved: 2024-06-13T12:33:44.661Z
Link: CVE-2024-5967

Updated: 2024-08-01T21:25:03.165Z

Status : Awaiting Analysis
Published: 2024-06-18T12:15:12.707
Modified: 2024-11-21T09:48:39.633
Link: CVE-2024-5967


No data.