CVE-2017-2582

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-2582
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-2582.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-2582
Aliases
Related
Published
2018-07-26T17:29:00Z
Modified
2024-09-02T23:49:01Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.

References

Affected packages

Git / github.com/keycloak/keycloak

Affected ranges

Type
GIT
Repo
https://github.com/keycloak/keycloak
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed