keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-3782 | Vendor Advisory |
Configurations
History
25 Jan 2023, 20:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:keycloak:20.0.2:*:*:*:*:*:*:* | |
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
First Time |
Redhat keycloak
Redhat |
|
References | (MISC) https://access.redhat.com/security/cve/CVE-2022-3782 - Vendor Advisory |
13 Jan 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-13 06:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-3782
Mitre link : CVE-2022-3782
CVE.ORG link : CVE-2022-3782
JSON object : View
Products Affected
redhat
- keycloak
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')