CVE-2017-15111: keycloak-httpd-client-install symlink attack vulnerability
5.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.17275%
CWE
Published
5/14/2022
Updated
10/24/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
keycloak-httpd-client-install | pip | < 0.8 | 0.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the insecure temporary file path configuration in the argument parser setup within the main() function. The GitHub patch specifically modifies the default log-file path from '/tmp/{prog_name}.log' to '{prog_name}.log', explicitly addressing the symlink attack vector by avoiding the insecure /tmp directory. The main() function is directly responsible for setting this vulnerable default path, making it the clear source of the vulnerability.