cve/2024/CVE-2024-3656.md

25 lines
1.3 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-3656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3656)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Build%20of%20Keycloak&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20JBoss%20Enterprise%20Application%20Platform%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Single%20Sign-On%207&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Product&message=null&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
- https://github.com/cyb3r-w0lf/nuclei-template-collection
2025-09-29 16:08:36 +00:00
- https://github.com/h4x0r-dz/CVE-2024-3656
- https://github.com/hnsecurity/vulns
2025-09-29 21:09:30 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00