Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2020-10770 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Keycloak forces server to call unverified URLs via OIDC `request_uri`. <br>πŸ’₯ **Consequences**: Enables **Server-Side Request Forgery (SSRF)**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: **CWE-918** (SSRF). <br>πŸ” **Flaw**: Lack of validation on the URL provided in the `request_uri` parameter. The server blindly trusts and fetches this external input.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Red Hat **Keycloak**. <br>πŸ“… **Affected**: Versions **12.0.1 and below**. <br>🏒 **Vendor**: Red Hat (USA).

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Perform **Blind SSRF**. <br>🌐 **Impact**: Port scan localhost, access internal hosts, or bypass network restrictions using the Keycloak server as a proxy.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. <br>πŸ”“ **Auth**: **Unauthenticated**. No login required to trigger the vulnerability via the OIDC parameter.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp?**: **YES**. <br>πŸ“‚ **PoC**: Available on GitHub (`ColdFusionX/Keycloak-12.0.1-CVE-2020-10770`) and Exploit-DB (**50405**). Python script provided.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for Keycloak instances. <br>πŸ§ͺ **Test**: Send malicious OIDC `request_uri` payloads. <br>πŸ“Š **Tool**: Use Nuclei templates (`CVE-2020-10770.yaml`) for automated detection.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. <br>πŸ“ **Status**: Red Hat acknowledged (Bugzilla #1846270). Users should upgrade to a patched version immediately.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Implement strict **URL allowlisting** for `request_uri`. <br>πŸ›‘ **Block**: Prevent Keycloak from making outbound requests to internal/private IP ranges via firewall rules.

Q10Is it urgent? (Priority Suggestion)

⚠️ **Urgency**: **HIGH**. <br>πŸ”₯ **Reason**: Unauthenticated SSRF allows easy network reconnaissance and potential data exfiltration. Patch ASAP!