Miggo Logo

CVE-2017-15111: keycloak-httpd-client-install symlink attack vulnerability

5.5

CVSS Score
3.0

Basic Information

EPSS Score
0.17275%
Published
5/14/2022
Updated
10/24/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
keycloak-httpd-client-installpip< 0.80.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the insecure temporary file path configuration in the argument parser setup within the main() function. The GitHub patch specifically modifies the default log-file path from '/tmp/{prog_name}.log' to '{prog_name}.log', explicitly addressing the symlink attack vector by avoiding the insecure /tmp directory. The main() function is directly responsible for setting this vulnerable default path, making it the clear source of the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

k*y*lo*k-*ttp*-*li*nt-inst*ll v*rsions ***or* *.* ins**ur*ly *r**t*s t*mpor*ry *il* *llowin* lo**l *tt**k*rs to ov*rwrit* ot**r *il*s vi* sym*oli* link.

Reasoning

T** vuln*r**ility st*ms *rom t** ins**ur* t*mpor*ry *il* p*t* *on*i*ur*tion in t** *r*um*nt p*rs*r s*tup wit*in t** m*in() *un*tion. T** *it*u* p*t** sp**i*i**lly mo*i*i*s t** ****ult lo*-*il* p*t* *rom '/tmp/{pro*_n*m*}.lo*' to '{pro*_n*m*}.lo*', *x