Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2020-10770 — Server-Side Request Forgery in Redhat Keycloak
Severity
5.3MEDIUMNVD
EPSS
92.3%
top 0.28%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 15
Latest updateSep 26
Description
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages2 packages
🔴Vulnerability Details
4💥Exploits & PoCs
2Exploit-DB▶
Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated)↗2021-10-13
Nuclei▶
Keycloak <= 12.0.1 - request_uri Blind Server-Side Request Forgery (SSRF)
📋Vendor Advisories
1Red Hat▶
keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter↗2020-11-26