Miggo Logo

CVE-2024-7260:
Keycloak Open Redirect vulnerability

4.4

CVSS Score
3.1

Basic Information

EPSS Score
0.36449%
Published
9/9/2024
Updated
9/9/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.keycloak:keycloak-coremaven< 24.0.724.0.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on improper handling of 'referrer' and 'referrer_uri' parameters in Keycloak's account page. The affected package (keycloak-core) and CWE-601 suggest a missing validation step in redirect logic. Keycloak's account management endpoints (e.g., /account) are prime candidates for this flaw. The AccountFormService class is a logical component responsible for processing account-related requests and redirects. While the exact patched code isn't available, the described attack vector aligns with functions that handle user-supplied redirect parameters without proper domain checks. Confidence is medium due to reliance on structural inference rather than explicit patch details.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n op*n r**ir**t vuln*r**ility w*s *oun* in K*y*lo*k. * sp**i*lly *r**t** URL **n ** *onstru*t** w**r* t** `r***rr*r` *n* `r***rr*r_uri` p*r*m*t*rs *r* m*** to tri*k * us*r to visit * m*li*ious w**p***. * trust** URL **n tri*k us*rs *n* *utom*tion in

Reasoning

T** vuln*r**ility **nt*rs on improp*r **n*lin* o* 'r***rr*r' *n* 'r***rr*r_uri' p*r*m*t*rs in K*y*lo*k's ***ount p***. T** *****t** p**k*** (k*y*lo*k-*or*) *n* *W*-*** su***st * missin* `v*li**tion` st*p in r**ir**t lo*i*. K*y*lo*k's ***ount m*n***m*