Impact
A flaw in Keycloak prohibits proper validation of HTTP redirects during client configuration processing. When an attacker supplies a malicious redirect URL, the server follows it and contacts targeted internal or restricted resources. The breach can result in the disclosure of sensitive internal information, such as cloud metadata, and allow attackers to map internal network infrastructure.
Affected Systems
The vulnerability impacts Red Hat Build of Keycloak, Red Hat JBoss Enterprise Application Platform 8, Red Hat JBoss Enterprise Application Platform Expansion Pack, and Red Hat Single Sign‑On 7. No specific version range is supplied; all affected variants are listed in the CNA product list.
Risk and Exploitability
The CVSS base score is 5.8, indicating moderate severity, and the EPSS score is less than 1%, suggesting a low likelihood of widespread exploitation. The issue is not listed in the CISA KEV catalog. The likely attack vector is a blind server‑side request forgery triggered by HTTP redirect handling, with minimal prerequisites other than the ability to influence client configuration requests.
OpenCVE Enrichment