
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability (CVE-2022-3782) was discovered in Keycloak, where the system fails to properly validate URLs included in redirects. This vulnerability was identified and disclosed on October 31, 2022. The flaw affects any Keycloak client that utilizes a wildcard in the Valid Redirect URIs field (CVE Mitre, NVD).
The vulnerability stems from improper URL validation in Keycloak's redirect functionality. Specifically, the flaw involves path traversal via double URL encoding, which can be exploited to bypass the system's URL validation mechanisms (Red Hat CVE).
If exploited, this vulnerability could allow an attacker to bypass validation and access other URLs and potentially sensitive information within the domain. Additionally, it may enable attackers to conduct further attacks against the affected system (CVE Mitre).
Red Hat has addressed this vulnerability through security updates, as evidenced by multiple security advisories including RHSA-2023:1661 and RHSA-2023:3815. Organizations using affected versions of Keycloak should apply the available security patches (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."