CVE-2020-10770
MEDIUM EXPLOITED NUCLEIKeycloak <13.0.0 - SSRF
Title source: llmDescription
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
Exploits (3)
exploitdb
WORKING POC
by Mayank Deshmukh · pythonwebappsjava
https://www.exploit-db.com/exploits/50405
nomisec
WORKING POC
8 stars
by ColdFusionX · infoleak
https://github.com/ColdFusionX/Keycloak-12.0.1-CVE-2020-10770
Nuclei Templates (1)
Keycloak <= 12.0.1 - request_uri Blind Server-Side Request Forgery (SSRF)
MEDIUMby dhiyaneshDk
Shodan:
http.html:"keycloak" || http.title:"keycloak" || http.favicon.hash:-1105083093
FOFA:
title="keycloak" || icon_hash=-1105083093 || body="keycloak"
Scores
CVSS v3
5.3
EPSS
0.9228
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Details
VulnCheck KEV
2024-01-22
CWE
CWE-918
Status
published
Products (2)
org.keycloak/keycloak-core
0 - 13.0.0Maven
redhat/keycloak
< 12.0.2
Published
Dec 15, 2020
Tracked Since
Feb 18, 2026