
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-3856 affects the ClassLoaderTheme and ClasspathThemeResourceProviderFactory components in Keycloak. The vulnerability allows reading any file available as a resource to the classloader. This security issue was discovered and reported in October 2021 (CVE Details).
The vulnerability exists in the ThemeResource endpoint that handles fetching theme resources. The classbased resource loaders implementation lacks proper path validation checks, allowing relative path traversal using '../' patterns. When requests for theme resources are made with a relative path from an external HTTP client, the system will return the content of accessible files (Red Hat Bugzilla).
The vulnerability exposes any files packaged within the deployed module, including other resources available as a classloader resource. This could potentially lead to unauthorized access to sensitive files and information disclosure (Red Hat Bugzilla).
The issue was fixed by implementing proper path validation in the ClassLoaderTheme and ClasspathThemeResourceProviderFactory components. The fix includes checking if the requested resource URL path starts with the root path and preventing access to files outside the intended directory (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."