CVE-2022-2232: Keycloak vulnerable to LDAP Injection on UsernameForm Login
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42073%
CWE
Published
11/29/2023
Updated
11/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.keycloak:keycloak-ldap-federation | maven | < 23.0.1 | 23.0.1 |
| org.keycloak:keycloak-services | maven | < 23.0.1 | 23.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped user input in LDAP queries. The commit diff shows the vulnerable code in getFilterById() appended the 'id' parameter directly to an LDAP filter. The patch adds EscapeStrategy.DEFAULT.escape(id), confirming this was the injection point. The CWE-90 classification and advisory description align with this code path being used during username-based LDAP lookups.