Miggo Logo

CVE-2017-2582: keycloak-core discloses system properties

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.70255%
Published
10/18/2018
Updated
9/7/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.keycloak:keycloak-coremaven< 2.5.12.5.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from StaxParserUtil's attribute handling where system property substitution occurred. The commit removes this behavior specifically in getAttributeValue(), which processes XML attributes during SAML parsing. This function would appear in stack traces when processing malicious SAML requests containing ${sys:...} patterns, as it directly handled the vulnerable substitution logic prior to patching.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

It w*s *oun* t**t w*il* p*rsin* t** S*ML m*ss***s t** St*xP*rs*rUtil *l*ss o* k*y*lo*k ***or* *.*.* r*pl***s sp**i*l strin*s *or o*t*inin* *ttri*ut* v*lu*s wit* syst*m prop*rty. T*is *oul* *llow *n *tt**k*r to **t*rmin* v*lu*s o* syst*m prop*rti*s *t

Reasoning

T** vuln*r**ility st*ms *rom `St*xP*rs*rUtil`'s *ttri*ut* **n*lin* w**r* syst*m prop*rty su*stitution o**urr**. T** *ommit r*mov*s t*is ****vior sp**i*i**lly in `**t*ttri*ut*V*lu*()`, w*i** pro**ss*s XML *ttri*ut*s *urin* S*ML p*rsin*. T*is *un*tion