Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10770

EPSS 92.28% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-10770

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
红帽 Red Hat Keycloak 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Keycloak是美国红帽(Red Hat)公司的一套为现代应用和服务提供身份验证和管理功能的软件。 Keycloak 存在代码问题漏洞,该漏洞源于在那里它可能迫使服务器使用OIDC参数请求uri调用一个未经验证的URL。这个缺陷允许攻击者可利用该漏洞使用这个参数来执行服务器端请求伪造(SSRF)攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-keycloak keycloak 13.0.0 -

II. Public POCs for CVE-2020-10770

#POC DescriptionSource LinkShenlong Link
1Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated) https://github.com/ColdFusionX/Keycloak-12.0.1-CVE-2020-10770POC Details
2Keycloak 12.0.1 and below allows an attacker to force the server to request an unverified URL using the OIDC parameter request_uri. This allows an attacker to execute a server-side request forgery (SSRF) attack.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-10770.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-10770

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-12-15 · 116 CVEs total

CVE-2020-284427.5 HIGHPrototype Pollution
CVE-2020-284567.3 HIGHCross-site Scripting (XSS)
CVE-2020-284577.2 HIGHCross-site Scripting (XSS)
CVE-2020-27056Google Android 安全漏洞
CVE-2020-29482Xen 代码问题漏洞
CVE-2020-29480Xen 授权问题漏洞
CVE-2020-29479Xen 权限许可和访问控制问题漏洞
CVE-2020-29571Xen 代码问题漏洞
CVE-2020-29570Xen 安全漏洞
CVE-2020-29569Linux kernel 资源管理错误漏洞
CVE-2020-27777Linux kernel 授权问题漏洞
CVE-2020-25712xorg-x11-server 缓冲区错误漏洞
CVE-2020-29568Xen 缓冲区错误漏洞
CVE-2020-29567Xen 安全漏洞
CVE-2020-29566Xen 处理逻辑错误漏洞
CVE-2020-27068Google Android 缓冲区错误漏洞
CVE-2020-27067Google Android 资源管理错误漏洞
CVE-2020-27049Google Android 缓冲区错误漏洞
CVE-2020-27048Google Android 缓冲区错误漏洞
CVE-2020-27047Google Android 缓冲区错误漏洞

Showing top 20 of 116 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-10770

No comments yet


Leave a comment