CVE-2024-3656
HIGH NUCLEIOrg.keycloak Keycloak-services < 24.0.5 - Information Disclosure
Title source: ruleDescription
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
Exploits (1)
Nuclei Templates (1)
Keycloak < 24.0.5 - Broken Access Control
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.favicon.hash:"-1105083093" || http.html:"keycloak" || http.title:"keycloak"
FOFA:
icon_hash=-1105083093 || body="keycloak" || title="keycloak"
References (8)
Scores
CVSS v3
8.1
EPSS
0.8966
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-200
Status
published
Products (4)
org.keycloak/keycloak-services
0 - 24.0.5Maven
Red Hat/Red Hat Build of Keycloak
Red Hat/Red Hat JBoss Enterprise Application Platform 8
Red Hat/Red Hat Single Sign-On 7
Published
Oct 09, 2024
Tracked Since
Feb 18, 2026