CVE-2017-2582

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.

References

http://www.securityfocus.com/bid/101046

http://www.securitytracker.com/id/1041707

https://access.redhat.com/errata/RHSA-2017:2808

https://access.redhat.com/errata/RHSA-2017:2809

https://access.redhat.com/errata/RHSA-2017:2810

https://access.redhat.com/errata/RHSA-2017:2811

https://access.redhat.com/errata/RHSA-2017:3216

https://access.redhat.com/errata/RHSA-2017:3217

https://access.redhat.com/errata/RHSA-2017:3218

https://access.redhat.com/errata/RHSA-2017:3219

https://access.redhat.com/errata/RHSA-2017:3220

https://access.redhat.com/errata/RHSA-2018:2740

https://access.redhat.com/errata/RHSA-2018:2741

https://access.redhat.com/errata/RHSA-2018:2742

https://access.redhat.com/errata/RHSA-2018:2743

https://access.redhat.com/errata/RHSA-2019:0136

https://access.redhat.com/errata/RHSA-2019:0137

https://access.redhat.com/errata/RHSA-2019:0139

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582

https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237

Details

Source: MITRE

Published: 2018-07-26

Updated: 2019-01-23

Type: CWE-200

Risk Information

CVSS v2

Base Score: 4

Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8

Severity: MEDIUM

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 2.8

Severity: MEDIUM

Tenable Plugins

View all (10 total)

IDNameProductFamilySeverity
121338RHEL 7 : JBoss EAP (RHSA-2019:0137)NessusRed Hat Local Security Checks
medium
121337RHEL 6 : JBoss EAP (RHSA-2019:0136)NessusRed Hat Local Security Checks
medium
117772RHEL 6 : JBoss EAP (RHSA-2018:2743)NessusRed Hat Local Security Checks
high
117771RHEL 7 : JBoss EAP (RHSA-2018:2741)NessusRed Hat Local Security Checks
high
104621RHEL 7 : JBoss EAP (RHSA-2017:3218)NessusRed Hat Local Security Checks
medium
104620RHEL 6 : JBoss EAP (RHSA-2017:3217)NessusRed Hat Local Security Checks
medium
104567RHEL 6 : jboss-ec2-eap (RHSA-2017:3219)NessusRed Hat Local Security Checks
medium
103527RHEL 6 : JBoss EAP (RHSA-2017:2809)NessusRed Hat Local Security Checks
critical
103526RHEL 7 : JBoss EAP (RHSA-2017:2808)NessusRed Hat Local Security Checks
critical
103500RHEL 6 / 7 : eap7-jboss-ec2-eap (RHSA-2017:2811)NessusRed Hat Local Security Checks
critical