Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-quarkus-server
  4. ›
  5. CVE-2024-10492

CVE-2024-10492: Keycloak Path Traversal Vulnerability Due to External Control of File Name or Path

November 25, 2024

A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.

References

  • access.redhat.com/errata/RHSA-2024:10175
  • access.redhat.com/errata/RHSA-2024:10176
  • access.redhat.com/errata/RHSA-2024:10177
  • access.redhat.com/errata/RHSA-2024:10178
  • access.redhat.com/security/cve/CVE-2024-10492
  • bugzilla.redhat.com/show_bug.cgi?id=2322447
  • github.com/advisories/GHSA-5545-r4hg-rj4m
  • github.com/keycloak/keycloak
  • github.com/keycloak/keycloak/commit/d60cb9aaefc4035d322862edd8f9f252af6da951
  • github.com/keycloak/keycloak/issues/35215
  • github.com/keycloak/keycloak/security/advisories/GHSA-5545-r4hg-rj4m
  • nvd.nist.gov/vuln/detail/CVE-2024-10492

Code Behaviors & Features

Detect and mitigate CVE-2024-10492 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 26.0.6, all versions starting from 25.0.0 before 26.0.6

Fixed versions

  • 26.0.6
  • 26.0.6

Solution

Upgrade to versions 26.0.6, 26.0.6 or above.

Impact 2.7 LOW

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-73: External Control of File Name or Path

Source file

maven/org.keycloak/keycloak-quarkus-server/CVE-2024-10492.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:02 +0000.