Keycloak allows unrestricted admin use of system and environment variables
Moderate severity
GitHub Reviewed
Published
Jan 13, 2025
in
keycloak/keycloak
•
Updated Jan 14, 2025
Package
Affected versions
< 26.0.8
Patched versions
26.0.8
Description
Published to the GitHub Advisory Database
Jan 13, 2025
Reviewed
Jan 13, 2025
Published by the National Vulnerability Database
Jan 14, 2025
Last updated
Jan 14, 2025
A security vulnerability has been identified that allows admin users to access sensitive server environment variables and system properties through user-configurable URLs. Specifically, when configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
References