CVE-2020-10770

MEDIUM EXPLOITED NUCLEI

Keycloak <13.0.0 - SSRF

Title source: llm

Description

A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.

Exploits (3)

exploitdb WORKING POC
by Mayank Deshmukh · pythonwebappsjava
https://www.exploit-db.com/exploits/50405
nomisec WORKING POC 8 stars
by ColdFusionX · infoleak
https://github.com/ColdFusionX/Keycloak-12.0.1-CVE-2020-10770
vulncheck_xdb WRITEUP
infoleak
https://github.com/ramshazar/keycloak-blind-ssrf-poc

Nuclei Templates (1)

Keycloak <= 12.0.1 - request_uri Blind Server-Side Request Forgery (SSRF)
MEDIUMby dhiyaneshDk
Shodan: http.html:"keycloak" || http.title:"keycloak" || http.favicon.hash:-1105083093
FOFA: title="keycloak" || icon_hash=-1105083093 || body="keycloak"

Scores

CVSS v3 5.3
EPSS 0.9228
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Details

VulnCheck KEV 2024-01-22
CWE
CWE-918
Status published
Products (2)
org.keycloak/keycloak-core 0 - 13.0.0Maven
redhat/keycloak < 12.0.2
Published Dec 15, 2020
Tracked Since Feb 18, 2026