CVE-2024-10492: Keycloak Path Traversal Vulnerability Due to External Control of File Name or Path
2.7
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.0668%
CWE
Published
11/25/2024
Updated
11/25/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.keycloak:keycloak-quarkus-server | maven | < 24.0.9 | 26.0.6 |
| org.keycloak:keycloak-quarkus-server | maven | >= 25.0.0, < 26.0.6 | 26.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient validation in key resolution logic. The commit d60cb9a introduced critical fixes: 1) Escaping underscores in KEY_ONLY to prevent resolver conflicts, 2) Path validation in FilesPlainTextVaultProvider to block traversal, and 3) Key sanitization in AbstractVaultProvider. The affected functions handled key resolution without proper path normalization/validation, enabling crafted keys to escape the vault's intended directory structure. Test cases in PlainTextVaultProviderTest confirm scenarios where keys with '../' or unescaped underscores would have been exploitable pre-patch.