Keycloak Authorization Bypass vulnerability
Moderate severity
GitHub Reviewed
Published
Apr 17, 2024
in
keycloak/keycloak
•
Updated Apr 25, 2024
Package
Affected versions
< 22.0.10
>= 23.0.0, < 24.0.3
Patched versions
22.0.10
24.0.3
Description
Published to the GitHub Advisory Database
Apr 17, 2024
Reviewed
Apr 17, 2024
Published by the National Vulnerability Database
Apr 25, 2024
Last updated
Apr 25, 2024
Due to a permissive regular expression hardcoded for filtering allowed hosts to register a dynamic client, a malicious user with enough information about the environment could benefit and jeopardize an environment with this specific Dynamic Client Registration with TrustedDomain configuration previously unauthorized.
Acknowledgements:
Special thanks to Bastian Kanbach for reporting this issue and helping us improve our security.
References