
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2022-2232) was discovered in the Keycloak package, which allows attackers to perform LDAP injection attacks. The vulnerability was reported on June 14, 2022, affecting Keycloak implementations where specific LDAP configurations are present (CVE Details, MITRE).
The vulnerability is related to improper input validation (CWE-20) in the username lookup functionality. The flaw specifically occurs when the 'UUID LDAP Attribute' values are not set to the standard values (entryUUID, objectGUID, or nsuniqueid). The vulnerability has been assigned a CVSS v3 base score of 7.5, indicating a moderate severity level with a network attack vector, low attack complexity, and no required privileges or user interaction (Red Hat CVE).
When successfully exploited, this vulnerability allows attackers to bypass username lookup mechanisms or potentially execute other malicious actions through LDAP injection. The CVSS scoring indicates high impact on confidentiality, while integrity and availability impacts are rated as none (Red Hat CVE).
The vulnerability can be mitigated by ensuring the 'UUID LDAP Attribute' values are set to the standard values: entryUUID, objectGUID, or nsuniqueid. When configured with these standard values, Keycloak is not vulnerable to this LDAP injection attack (Red Hat CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."