๐Ÿ” CVE Alert

CVE-2024-1132

HIGH 8.1

Keycloak: path transversal in redirection validation

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.

CWE CWE-22
Published Apr 17, 2024
Last Updated Mar 17, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Red Hat / Migration Toolkit for Runtimes 1 on RHEL 8
All versions affected
Red Hat / Migration Toolkit for Runtimes 1 on RHEL 8
All versions affected
Red Hat / Migration Toolkit for Runtimes 1 on RHEL 8
All versions affected
Red Hat / Migration Toolkit for Runtimes 1 on RHEL 8
All versions affected
Red Hat / MTA-6.2-RHEL-9
All versions affected
Red Hat / Red Hat AMQ Broker 7
All versions affected
Red Hat / Red Hat AMQ Broker 7
All versions affected
Red Hat / Red Hat AMQ Broker 7
All versions affected
Red Hat / Red Hat build of Keycloak 22
All versions affected
Red Hat / Red Hat build of Keycloak 22
All versions affected
Red Hat / Red Hat build of Keycloak 22
All versions affected
Red Hat / Red Hat build of Keycloak 22.0.10
All versions affected
Red Hat / Red Hat Single Sign-On 7.6 for RHEL 7
All versions affected
Red Hat / Red Hat Single Sign-On 7.6 for RHEL 8
All versions affected
Red Hat / Red Hat Single Sign-On 7.6 for RHEL 9
All versions affected
Red Hat / RHEL-8 based Middleware Containers
All versions affected
Red Hat / RHSSO 7.6.8
All versions affected
Red Hat / Red Hat build of Apicurio Registry 2
All versions affected
Red Hat / Red Hat build of Quarkus
All versions affected
Red Hat / Red Hat build of Quarkus
All versions affected
Red Hat / Red Hat Data Grid 8
All versions affected
Red Hat / Red Hat Decision Manager 7
All versions affected
Red Hat / Red Hat Fuse 7
All versions affected
Red Hat / Red Hat JBoss Data Grid 7
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform 6
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform 7
All versions affected
Red Hat / Red Hat Process Automation 7
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1860 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1861 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1862 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1864 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1866 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1867 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1868 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2945 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3752 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3762 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3919 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3989 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-1132 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2262117

Credits

Red Hat would like to thank Axel Flamcourt for reporting this issue.