CVE-2024-1132
📋 TL;DR
This vulnerability in Keycloak allows attackers to bypass URL validation in redirects when clients use wildcards in Valid Redirect URIs. Attackers can construct malicious requests to access unauthorized URLs and sensitive information within the domain. This affects Keycloak deployments where clients have configured wildcard redirect URIs and requires user interaction with a malicious link.
💻 Affected Systems
- Keycloak
📦 What is this software?
Jboss Middleware Text Only Advisories by Redhat
View all CVEs affecting Jboss Middleware Text Only Advisories →
Keycloak by Redhat
Keycloak by Redhat
Migration Toolkit For Applications by Redhat
View all CVEs affecting Migration Toolkit For Applications →
Openshift Container Platform For Ibm Z by Redhat
View all CVEs affecting Openshift Container Platform For Ibm Z →
Openshift Container Platform For Ibm Z by Redhat
View all CVEs affecting Openshift Container Platform For Ibm Z →
Openshift Container Platform For Linuxone by Redhat
View all CVEs affecting Openshift Container Platform For Linuxone →
Openshift Container Platform For Linuxone by Redhat
View all CVEs affecting Openshift Container Platform For Linuxone →
Openshift Container Platform For Power by Redhat
View all CVEs affecting Openshift Container Platform For Power →
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive information, perform unauthorized actions within the domain, or chain with other vulnerabilities for complete system compromise.
Likely Case
Attackers could access internal resources, steal session tokens, or perform limited unauthorized actions within the affected domain.
If Mitigated
With proper input validation and redirect restrictions, impact is limited to failed exploitation attempts.
🎯 Exploit Status
Requires user interaction with malicious URL and specific client configuration with wildcard redirect URIs
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Red Hat advisories for specific patched versions
Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:1860
Restart Required: Yes
Instructions:
1. Review Red Hat advisories for affected versions. 2. Update Keycloak to patched version. 3. Restart Keycloak service. 4. Verify fix is applied.
🔧 Temporary Workarounds
Remove wildcard redirect URIs
allReplace wildcard patterns in Valid Redirect URIs with specific, fully-qualified URLs
Implement strict redirect validation
allAdd additional validation layers for redirect URLs in application code
🧯 If You Can't Patch
- Disable or restrict clients using wildcard redirect URIs
- Implement WAF rules to detect and block suspicious redirect patterns
🔍 How to Verify
Check if Vulnerable:
Check Keycloak client configurations for wildcard patterns in Valid Redirect URIs field
Check Version:
Check Keycloak server logs or admin console for version information
Verify Fix Applied:
Verify Keycloak version is updated to patched version and test redirect validation
📡 Detection & Monitoring
Log Indicators:
- Unusual redirect patterns
- Failed redirect validation attempts
- Requests with crafted redirect parameters
Network Indicators:
- Suspicious redirect chains
- Requests to unexpected URLs following authentication
SIEM Query:
Search for redirect parameters containing wildcards or unusual patterns in web server logs
🔗 References
- https://access.redhat.com/errata/RHSA-2024:1860
- https://access.redhat.com/errata/RHSA-2024:1861
- https://access.redhat.com/errata/RHSA-2024:1862
- https://access.redhat.com/errata/RHSA-2024:1864
- https://access.redhat.com/errata/RHSA-2024:1866
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/errata/RHSA-2024:2945
- https://access.redhat.com/errata/RHSA-2024:3752
- https://access.redhat.com/errata/RHSA-2024:3762
- https://access.redhat.com/errata/RHSA-2024:3919
- https://access.redhat.com/errata/RHSA-2024:3989
- https://access.redhat.com/security/cve/CVE-2024-1132
- https://bugzilla.redhat.com/show_bug.cgi?id=2262117
- https://access.redhat.com/errata/RHSA-2024:1860
- https://access.redhat.com/errata/RHSA-2024:1861
- https://access.redhat.com/errata/RHSA-2024:1862
- https://access.redhat.com/errata/RHSA-2024:1864
- https://access.redhat.com/errata/RHSA-2024:1866
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/errata/RHSA-2024:2945
- https://access.redhat.com/errata/RHSA-2024:3752
- https://access.redhat.com/errata/RHSA-2024:3762
- https://access.redhat.com/errata/RHSA-2024:3919
- https://access.redhat.com/errata/RHSA-2024:3989
- https://access.redhat.com/security/cve/CVE-2024-1132
- https://bugzilla.redhat.com/show_bug.cgi?id=2262117