CVE-2024-10451

5.9 MEDIUM

📋 TL;DR

This vulnerability in Keycloak allows sensitive runtime values like passwords to be captured during the build process and embedded as default values in bytecode, leading to information disclosure. Attackers could potentially access these embedded secrets during runtime. All Keycloak versions up to 26.0.2 are affected.

💻 Affected Systems

Products:
  • Keycloak
Versions: All versions up to and including 26.0.2
Operating Systems: All platforms running Keycloak
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects both direct environment variable usage and indirect usage through SPI options and Quarkus properties during build process.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to embedded sensitive credentials (passwords, tokens, keys) leading to full system compromise, data breaches, and lateral movement within the environment.

🟠

Likely Case

Unauthorized access to sensitive configuration data and credentials stored in bytecode, potentially enabling privilege escalation or further attacks.

🟢

If Mitigated

Limited exposure with proper access controls, but embedded secrets remain in bytecode creating persistent risk.

🌐 Internet-Facing: MEDIUM - While exploitation requires access to runtime environment, exposed Keycloak instances could leak embedded credentials to attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could extract sensitive data from bytecode.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to runtime environment and knowledge of how to extract embedded values from bytecode.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Keycloak 26.0.3 and later

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-10451

Restart Required: Yes

Instructions:

1. Upgrade to Keycloak 26.0.3 or later. 2. Rebuild any custom Keycloak distributions. 3. Restart Keycloak services. 4. Rotate any potentially exposed credentials.

🔧 Temporary Workarounds

Avoid sensitive data in build environment

all

Do not pass sensitive values directly as environment variables during Keycloak build process

Use external configuration

all

Store sensitive configuration in external secure stores rather than embedding during build

🧯 If You Can't Patch

  • Rotate all credentials that may have been exposed during build process
  • Implement strict access controls and monitoring on Keycloak runtime environments

🔍 How to Verify

Check if Vulnerable:

Check Keycloak version: if version is 26.0.2 or earlier, system is vulnerable. Review build process for sensitive environment variable usage.

Check Version:

keycloak.sh --version or check Keycloak admin console version information

Verify Fix Applied:

Confirm Keycloak version is 26.0.3 or later. Verify no sensitive data is embedded in bytecode by checking configuration sources.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to configuration endpoints
  • Attempts to extract runtime configuration data

Network Indicators:

  • Suspicious requests to configuration-related API endpoints

SIEM Query:

source="keycloak" AND (event_type="CONFIG_ACCESS" OR uri_path="/admin/realms/*/config")

🔗 References

📤 Share & Export