Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Build of Keycloak | - | cpe:/a:redhat:build_keycloak:22 | |
| Red Hat | Red Hat Single Sign-On 7 | - | cpe:/a:redhat:red_hat_single_sign_on:7.6 | |
| Red Hat | Red Hat Build of Keycloak | - | cpe:/a:redhat:build_keycloak: | |
| Red Hat | Red Hat JBoss Enterprise Application Platform 8 | - | cpe:/a:redhat:jboss_enterprise_application_platform:8 | |
| Red Hat | Red Hat Single Sign-On 7 | - | cpe:/a:redhat:red_hat_single_sign_on:7 |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Keycloak admin API allows low privilege users to use administrative functions | https://github.com/h4x0r-dz/CVE-2024-3656 | POC Details |
| 2 | A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3656.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet