A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
The product uses an environment variable to store unencrypted sensitive information.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat build of Keycloak 26.0 | RedHat | rhbk/keycloak-operator-bundle:26.0.8-1 | * |
Red Hat build of Keycloak 26.0 | RedHat | rhbk/keycloak-rhel9:26.0-7 | * |
Red Hat build of Keycloak 26.0 | RedHat | rhbk/keycloak-rhel9-operator:26.0-8 | * |
RHBK 26.0.8 | RedHat | org.keycloak/keycloak-quarkus-server | * |