CVE-2017-2582

It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
References
Link Resource
http://www.securityfocus.com/bid/101046 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041707 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2808 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2809 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2810 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2811 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3216 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3217 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3218 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3219 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3220 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2740 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2741 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2742 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2743 Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0136
https://access.redhat.com/errata/RHSA-2019:0137
https://access.redhat.com/errata/RHSA-2019:0139
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582 Issue Tracking Patch Vendor Advisory
https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237 Patch Third Party Advisory
http://www.securityfocus.com/bid/101046 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041707 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2808 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2809 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2810 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:2811 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3216 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3217 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3218 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3219 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:3220 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2740 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2741 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2742 Vendor Advisory
https://access.redhat.com/errata/RHSA-2018:2743 Vendor Advisory
https://access.redhat.com/errata/RHSA-2019:0136
https://access.redhat.com/errata/RHSA-2019:0137
https://access.redhat.com/errata/RHSA-2019:0139
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582 Issue Tracking Patch Vendor Advisory
https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:23

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101046 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101046 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041707 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041707 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:2808 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2808 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:2809 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2809 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:2810 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2810 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:2811 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:2811 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3216 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3216 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3217 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3217 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3218 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3218 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3219 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3219 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:3220 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:3220 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2740 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2740 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2741 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2741 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2742 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2742 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:2743 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:2743 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2019:0136 - () https://access.redhat.com/errata/RHSA-2019:0136 -
References () https://access.redhat.com/errata/RHSA-2019:0137 - () https://access.redhat.com/errata/RHSA-2019:0137 -
References () https://access.redhat.com/errata/RHSA-2019:0139 - () https://access.redhat.com/errata/RHSA-2019:0139 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582 - Issue Tracking, Patch, Vendor Advisory
References () https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237 - Patch, Third Party Advisory () https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237 - Patch, Third Party Advisory

Information

Published : 2018-07-26 17:29

Updated : 2024-11-21 03:23


NVD link : CVE-2017-2582

Mitre link : CVE-2017-2582

CVE.ORG link : CVE-2017-2582


JSON object : View

Products Affected

redhat

  • jboss_enterprise_application_platform
  • enterprise_linux
  • keycloak
CWE
CWE-201

Insertion of Sensitive Information Into Sent Data

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor