Search for vulnerabilities
Vulnerability details: VCID-ubt4-nmw3-aaap
Vulnerability ID VCID-ubt4-nmw3-aaap
Aliases CVE-2024-1132
GHSA-72vp-xfrc-42xm
Summary A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1860
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1860
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1861
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1861
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1862
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1862
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1864
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1864
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:1866
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1866
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2024:1867
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1867
cvssv3.1 7.4 https://access.redhat.com/errata/RHSA-2024:1868
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1868
cvssv3.1 7.4 https://access.redhat.com/errata/RHSA-2024:2945
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:2945
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2024:3752
ssvc Track* https://access.redhat.com/errata/RHSA-2024:3752
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2024:3762
ssvc Track* https://access.redhat.com/errata/RHSA-2024:3762
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2024:3919
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3919
cvssv3.1 5.4 https://access.redhat.com/errata/RHSA-2024:3989
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2024:3989
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1132.json
cvssv3.1 8.1 https://access.redhat.com/security/cve/CVE-2024-1132
generic_textual HIGH https://access.redhat.com/security/cve/CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.00372 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.006 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
epss 0.01127 https://api.first.org/data/v1/epss?cve=CVE-2024-1132
cvssv3.1 8.1 https://bugzilla.redhat.com/show_bug.cgi?id=2262117
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=2262117
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-72vp-xfrc-42xm
cvssv3.1 6.8 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1_qr HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-72vp-xfrc-42xm
Reference id Reference type URL
https://access.redhat.com/errata/RHSA-2024:1860
https://access.redhat.com/errata/RHSA-2024:1861
https://access.redhat.com/errata/RHSA-2024:1862
https://access.redhat.com/errata/RHSA-2024:1864
https://access.redhat.com/errata/RHSA-2024:1866
https://access.redhat.com/errata/RHSA-2024:1867
https://access.redhat.com/errata/RHSA-2024:1868
https://access.redhat.com/errata/RHSA-2024:2945
https://access.redhat.com/errata/RHSA-2024:3919
https://access.redhat.com/errata/RHSA-2024:3989
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1132.json
https://access.redhat.com/security/cve/CVE-2024-1132
https://api.first.org/data/v1/epss?cve=CVE-2024-1132
https://bugzilla.redhat.com/show_bug.cgi?id=2262117
https://github.com/keycloak/keycloak
cpe:/a:redhat:amq_broker:7.10 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:amq_broker:7.10
cpe:/a:redhat:amq_broker:7.11 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:amq_broker:7.11
cpe:/a:redhat:amq_broker:7.12 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:amq_broker:7.12
cpe:/a:redhat:build_keycloak:22 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22
cpe:/a:redhat:build_keycloak:22::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22::el9
cpe:/a:redhat:jboss_data_grid:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_data_grid:7
cpe:/a:redhat:jboss_data_grid:8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_data_grid:8
cpe:/a:redhat:jboss_enterprise_application_platform:6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:6
cpe:/a:redhat:jboss_enterprise_application_platform:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:7
cpe:/a:redhat:jboss_enterprise_bpms_platform:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_bpms_platform:7
cpe:/a:redhat:jboss_enterprise_brms_platform:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_brms_platform:7
cpe:/a:redhat:jboss_fuse:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_fuse:7
cpe:/a:redhat:migration_toolkit_applications:6.2::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:migration_toolkit_applications:6.2::el8
cpe:/a:redhat:migration_toolkit_applications:6.2::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:migration_toolkit_applications:6.2::el9
cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8
cpe:/a:redhat:quarkus:3 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:quarkus:3
cpe:/a:redhat:red_hat_single_sign_on:7.6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6
cpe:/a:redhat:red_hat_single_sign_on:7.6::el7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
cpe:/a:redhat:red_hat_single_sign_on:7.6::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
cpe:/a:redhat:red_hat_single_sign_on:7.6::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
cpe:/a:redhat:rhosemc:1.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhosemc:1.0::el8
cpe:/a:redhat:service_registry:2 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:service_registry:2
CVE-2024-1132 https://nvd.nist.gov/vuln/detail/CVE-2024-1132
GHSA-72vp-xfrc-42xm https://github.com/advisories/GHSA-72vp-xfrc-42xm
GHSA-72vp-xfrc-42xm https://github.com/keycloak/keycloak/security/advisories/GHSA-72vp-xfrc-42xm
RHSA-2024:3752 https://access.redhat.com/errata/RHSA-2024:3752
RHSA-2024:3762 https://access.redhat.com/errata/RHSA-2024:3762
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1860
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1861
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1862
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1864
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1866
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://access.redhat.com/errata/RHSA-2024:1867
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:1868
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:2945
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2024:3752
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-23T18:37:10Z/ Found at https://access.redhat.com/errata/RHSA-2024:3752
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2024:3762
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-23T18:37:10Z/ Found at https://access.redhat.com/errata/RHSA-2024:3762
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2024:3919
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://access.redhat.com/errata/RHSA-2024:3989
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1132.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://access.redhat.com/security/cve/CVE-2024-1132
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2262117
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.18115
EPSS Score 0.00046
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-04-23T17:17:59.892833+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2024-1132 34.0.0rc4