CVE-2024-10973: Keycloak vulnerable to Cleartext Transmission of Sensitive Information
A vulnerability was found in Keycloak. The environment option KC_CACHE_EMBEDDED_MTLS_ENABLED
does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information.
References
- access.redhat.com/security/cve/CVE-2024-10973
- bugzilla.redhat.com/show_bug.cgi?id=2324361
- github.com/advisories/GHSA-6mpx-pmgp-ww49
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/commit/071032a108bd9e9fce9e66d00c36d56bd4b334df
- github.com/keycloak/keycloak/commit/36defd5f33b2da5d705f179bbaa21c28b13a9996
- github.com/keycloak/keycloak/issues/28750
- github.com/keycloak/keycloak/issues/34644
- github.com/keycloak/keycloak/pull/28756
- github.com/keycloak/keycloak/pull/34668
- nvd.nist.gov/vuln/detail/CVE-2024-10973
Detect and mitigate CVE-2024-10973 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →