Keycloak allows unrestricted admin use of system and environment variables
Moderate severity
GitHub Reviewed
Published
Jan 13, 2025
in
keycloak/keycloak
•
Updated Jan 13, 2025
Package
Affected versions
< 26.0.8
Patched versions
26.0.8
Description
Published to the GitHub Advisory Database
Jan 13, 2025
Reviewed
Jan 13, 2025
Last updated
Jan 13, 2025
A security vulnerability has been identified that allows admin users to access sensitive server environment variables and system properties through user-configurable URLs. Specifically, when configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
References