Description

Keycloak, the open-source identity and access management platform, has released important updates to address several vulnerabilities that could lead to denial-of-service (DoS) attacks, data leaks, and authentication bypasses. These issues affect various aspects of the platform, posing significant risks to users if left unpatched. One critical vulnerability, CVE-2024-10270 (CVSS 6.5), involves the SearchQueryUtils method, which attackers could exploit to exhaust system resources, resulting in a DoS attack. Another issue, CVE-2024-10451 (CVSS 5.9), may expose sensitive data such as passwords during the build process by embedding them in bytecode. Additionally, CVE-2024-10039 (CVSS 7.1) affects deployments using mutual TLS (mTLS) authentication. Attackers on the local network could bypass authentication and impersonate users or clients in setups with reverse proxies not using pass-through TLS termination and mTLS enabled. Other vulnerabilities addressed include CVE-2024-10492 (CVSS 2.7), where high-privileged users could access sensitive Vault file data, and CVE-2024-9666 (CVSS 4.7), a DoS vulnerability caused by improper handling of proxy headers.