Duplicate Advisory: Keycloak vulnerable to Cleartext Transmission of Sensitive Information
Moderate severity
GitHub Reviewed
Published
Dec 18, 2024
to the GitHub Advisory Database
•
Updated Feb 5, 2025
Withdrawn
This advisory was withdrawn on Feb 5, 2025
Package
Affected versions
>= 25.0.0, < 26.0.6
Patched versions
26.0.6
Description
Published by the National Vulnerability Database
Dec 17, 2024
Published to the GitHub Advisory Database
Dec 18, 2024
Reviewed
Dec 18, 2024
Withdrawn
Feb 5, 2025
Last updated
Feb 5, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-g6qq-c9f9-2772. This link is maintained to preserve external references.
Original Description
A vulnerability was found in Keycloak. The environment option
KC_CACHE_EMBEDDED_MTLS_ENABLED
does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information.References