A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2024-06-18T12:05:39.289Z

Updated: 2024-06-18T15:10:16.045Z

Reserved: 2024-06-13T12:33:44.661Z


Link: CVE-2024-5967

JSON object: View

cve-icon NVD Information

Status : Awaiting Analysis

Published: 2024-06-18T12:15:12.707

Modified: 2024-06-20T12:44:01.637


Link: CVE-2024-5967

JSON object: View

cve-icon Redhat Information

No data.

CWE