A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
References
Configurations
Configuration 1 (hide)
|
History
30 Jun 2025, 13:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat single Sign-on
Redhat jboss Middleware Text-only Advisories Redhat openshift Container Platform For Power Redhat openshift Container Platform For Ibm Z Redhat build Of Keycloak Redhat migration Toolkit For Applications Redhat openshift Container Platform For Linuxone Redhat openshift Container Platform Redhat keycloak Redhat migration Toolkit For Runtimes Redhat |
|
References | () https://access.redhat.com/errata/RHSA-2024:1860 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1861 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1862 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1864 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1866 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1867 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1868 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2945 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3752 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3762 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3919 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3989 - Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-1132 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2262117 - Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:a:redhat:migration_toolkit_for_applications:1.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:migration_toolkit_for_runtimes:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:* cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:* cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:* cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:* cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:* |
21 Nov 2024, 08:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2024:1860 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1861 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1862 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1864 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1866 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1867 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1868 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2945 - | |
References | () https://access.redhat.com/errata/RHSA-2024:3752 - | |
References | () https://access.redhat.com/errata/RHSA-2024:3762 - | |
References | () https://access.redhat.com/errata/RHSA-2024:3919 - | |
References | () https://access.redhat.com/errata/RHSA-2024:3989 - | |
References | () https://access.redhat.com/security/cve/CVE-2024-1132 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2262117 - |
20 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jun 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
17 Apr 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-17 14:15
Updated : 2025-06-30 13:58
NVD link : CVE-2024-1132
Mitre link : CVE-2024-1132
CVE.ORG link : CVE-2024-1132
JSON object : View
Products Affected
redhat
- keycloak
- single_sign-on
- migration_toolkit_for_runtimes
- openshift_container_platform
- jboss_middleware_text-only_advisories
- openshift_container_platform_for_linuxone
- build_of_keycloak
- migration_toolkit_for_applications
- openshift_container_platform_for_ibm_z
- openshift_container_platform_for_power
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')