CVE-2017-2582

It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
References
Link Resource
http://www.securityfocus.com/bid/101046 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041707 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2808 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2809 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2810 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2811 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3216 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3217 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3218 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3219 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3220 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2740 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2741 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2742 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2743 Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0136
https://access.redhat.com/errata/RHSA-2019:0137
https://access.redhat.com/errata/RHSA-2019:0139
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582 Issue Tracking Patch Vendor Advisory
https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237 Patch Third Party Advisory
http://www.securityfocus.com/bid/101046 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041707 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2808 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2809 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2810 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2811 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3216 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3217 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3218 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3219 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3220 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2740 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2741 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2742 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2743 Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0136
https://access.redhat.com/errata/RHSA-2019:0137
https://access.redhat.com/errata/RHSA-2019:0139
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582 Issue Tracking Patch Vendor Advisory
https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-26 17:29

Updated : 2024-11-21 03:23


NVD link : CVE-2017-2582

Mitre link : CVE-2017-2582

CVE.ORG link : CVE-2017-2582


JSON object : View

Products Affected

redhat

  • keycloak
  • enterprise_linux
  • jboss_enterprise_application_platform
CWE
CWE-201

Insertion of Sensitive Information Into Sent Data

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor