CVE-2024-3656: Keycloak's admin API allows low privilege users to use administrative functions
(updated )
Users with low privileges (just plain users in the realm) are able to utilize administrative functionalities within Keycloak admin interface. This issue presents a significant security risk as it allows unauthorized users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
Acknowledgements: Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project.
References
- access.redhat.com/errata/RHSA-2024:3572
- access.redhat.com/errata/RHSA-2024:3575
- access.redhat.com/security/cve/CVE-2024-3656
- bugzilla.redhat.com/show_bug.cgi?id=2274403
- github.com/advisories/GHSA-2cww-fgmg-4jqc
- github.com/hnsecurity/vulns/blob/main/HNS-2024-08-Keycloak.md
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/commit/d9f0c84b797525eac55914db5f81a8133ef5f9b1
- github.com/keycloak/keycloak/security/advisories/GHSA-2cww-fgmg-4jqc
- news.ycombinator.com/item?id=42136000
- nvd.nist.gov/vuln/detail/CVE-2024-3656
- security.humanativaspa.it/an-analysis-of-the-keycloak-authentication-system
Detect and mitigate CVE-2024-3656 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →