Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5967: Incorrect Default Permissions

0
Low
VulnerabilityCVE-2024-5967cvecve-2024-5967
Published: Tue Jun 18 2024 (06/18/2024, 12:05:39 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:27:53 UTC

Technical Analysis

CVE-2024-5967 is a security vulnerability identified in Keycloak, an open-source identity and access management solution widely used for single sign-on and identity federation. The flaw resides in the LDAP testing endpoint, which allows an attacker possessing administrative privileges (specifically the 'manage-realm' permission) to modify the LDAP Connection URL without requiring re-entry of the LDAP bind credentials. This means that an attacker can redirect the Keycloak server to connect to a malicious LDAP server under their control. When Keycloak attempts to authenticate using the configured credentials, these credentials are sent to the attacker’s server, resulting in credential leakage. The vulnerability affects Keycloak versions 0, 23.0.0, and 25.0.0 as reported. The attack vector is network-based and requires high privileges, with no user interaction needed. The CVSS v3.1 score is 2.7 (low severity), reflecting the limited scope and the prerequisite of admin access. Although no public exploits are known, the impact of leaked domain credentials can be severe, potentially enabling further domain compromise and lateral movement within an organization’s network. The vulnerability highlights the risk of incorrect default permissions and insufficient validation in administrative interfaces, especially those that handle sensitive authentication configurations.

Potential Impact

The primary impact of CVE-2024-5967 is the potential leakage of LDAP bind credentials, which are often domain or directory service credentials with significant access privileges. If an attacker gains admin access to the Keycloak admin console or compromises a user with the 'manage-realm' permission, they can exploit this vulnerability to redirect authentication attempts to a malicious server and capture these credentials. This can lead to further compromise of the organization's domain environment, enabling attackers to escalate privileges, move laterally, and access sensitive data. While the vulnerability itself does not directly affect system availability or integrity, the resulting credential leakage can have severe downstream effects on confidentiality and overall security posture. Organizations relying on Keycloak for identity management and LDAP integration are at risk, especially if they do not enforce strict access controls on admin privileges or monitor for unusual LDAP connection attempts. The low CVSS score reflects the requirement for admin-level access, but the potential impact on domain security elevates the importance of addressing this issue promptly.

Mitigation Recommendations

To mitigate CVE-2024-5967, organizations should: 1) Immediately restrict and audit access to the Keycloak admin console, ensuring only trusted administrators have the 'manage-realm' permission. 2) Apply any available patches or updates from Keycloak that address this vulnerability as soon as they are released. 3) Implement network-level controls to restrict outbound connections from Keycloak servers to only trusted LDAP servers, preventing redirection to attacker-controlled hosts. 4) Monitor LDAP connection logs and Keycloak administrative actions for unusual changes to the Connection URL or unexpected LDAP server connections. 5) Enforce multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise. 6) Regularly review and minimize the number of users with high-level permissions in Keycloak. 7) Consider isolating Keycloak servers within segmented network zones to limit exposure. These steps go beyond generic advice by focusing on access control hardening, network restrictions, and proactive monitoring specific to this vulnerability’s exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-06-13T12:33:44.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69201212ce2640f942c372d4

Added to database: 11/21/2025, 7:17:38 AM

Last enriched: 3/18/2026, 6:27:53 PM

Last updated: 3/22/2026, 6:10:03 PM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses