Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11736: Cleartext Storage of Sensitive Information in an Environment Variable

0
Medium
VulnerabilityCVE-2024-11736cvecve-2024-11736
Published: Tue Jan 14 2025 (01/14/2025, 08:36:08 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:32:42 UTC

Technical Analysis

CVE-2024-11736 is a vulnerability identified in Keycloak, an open-source identity and access management solution widely used for authentication and authorization. The issue arises from the way Keycloak processes user-configurable URLs, specifically backchannel logout URLs or admin URLs, which can include placeholders referencing environment variables (${env.VARNAME}) or system properties (${PROPNAME}). When these URLs are processed, the server replaces these placeholders with the actual values from the environment or system properties, potentially exposing sensitive information such as credentials, tokens, or configuration secrets in cleartext within URLs. This exposure can occur if an administrator inadvertently or maliciously configures URLs containing these placeholders. Exploitation requires administrative privileges, as only admin users can configure these URLs, and no user interaction is necessary. The vulnerability impacts confidentiality but does not affect integrity or availability. The CVSS 3.1 score is 4.9 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high confidentiality impact. No known exploits have been reported in the wild, and no patches have been linked yet. The vulnerability highlights a design flaw in how environment variables and system properties are interpolated into URLs without adequate safeguards, risking leakage of sensitive data through logs, monitoring tools, or network traffic if URLs are exposed.

Potential Impact

The primary impact of CVE-2024-11736 is the potential exposure of sensitive environment variables and system properties, which may include secrets such as database credentials, API keys, or internal configuration details. This exposure compromises confidentiality and can facilitate further attacks if attackers gain access to these URLs or logs containing them. Since exploitation requires admin privileges, the risk is somewhat contained within administrative roles; however, insider threats or compromised admin accounts could leverage this vulnerability to escalate access or exfiltrate sensitive data. Organizations relying on Keycloak for critical identity management may face increased risk of credential leakage, leading to unauthorized access to other systems. The vulnerability does not affect system integrity or availability directly but can undermine trust in the security of the identity platform. The absence of known exploits reduces immediate risk, but the medium severity score indicates that organizations should address this promptly to prevent potential data leaks.

Mitigation Recommendations

To mitigate CVE-2024-11736, organizations should immediately audit all backchannel logout URLs and admin URLs configured in Keycloak for the presence of environment variable or system property placeholders. Remove or replace any such placeholders that expose sensitive information. Limit administrative access strictly to trusted personnel and enforce strong authentication and monitoring of admin activities to reduce the risk of misuse. Implement network-level protections to restrict access to administrative interfaces. Until an official patch is released, consider disabling or restricting features that allow dynamic URL placeholders if feasible. Monitor logs and network traffic for any unexpected exposure of environment variable values. Additionally, review and rotate any secrets that may have been exposed due to this vulnerability. Stay updated with Keycloak security advisories for patches or configuration guidance addressing this issue.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-11-26T04:36:51.824Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5eeb11cb603d890ffb52

Added to database: 11/20/2025, 6:33:15 PM

Last enriched: 2/28/2026, 11:32:42 AM

Last updated: 3/26/2026, 11:11:35 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses