Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-quarkus-server
  4. ›
  5. GHSA-jcgg-mg9g-p9wf

GHSA-jcgg-mg9g-p9wf: Duplicate Advisory: Keycloak Build Process Exposes Sensitive Data

November 25, 2024

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-v7gv-xpgf-6395. This link is maintained to preserve external references.

Original Description

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.

References

  • access.redhat.com/errata/RHSA-2024:10175
  • access.redhat.com/errata/RHSA-2024:10176
  • access.redhat.com/errata/RHSA-2024:10177
  • access.redhat.com/errata/RHSA-2024:10178
  • access.redhat.com/security/cve/CVE-2024-10451
  • bugzilla.redhat.com/show_bug.cgi?id=2322096
  • github.com/advisories/GHSA-jcgg-mg9g-p9wf
  • nvd.nist.gov/vuln/detail/CVE-2024-10451

Code Behaviors & Features

Detect and mitigate GHSA-jcgg-mg9g-p9wf with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 24.0.9, all versions starting from 25.0.0 before 26.0.6

Fixed versions

  • 24.0.9
  • 26.0.6

Solution

Upgrade to versions 24.0.9, 26.0.6 or above.

Impact 5.9 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-798: Use of Hard-coded Credentials

Source file

maven/org.keycloak/keycloak-quarkus-server/GHSA-jcgg-mg9g-p9wf.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.