{"uuid": "ea55cb15-727f-4d1e-92ec-07e8bb4fe1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10492", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5457", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10492\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.\n\ud83d\udccf Published: 2024-11-25T07:37:30.572Z\n\ud83d\udccf Modified: 2025-02-26T04:23:59.830Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:10175\n2. https://access.redhat.com/errata/RHSA-2024:10176\n3. https://access.redhat.com/errata/RHSA-2024:10177\n4. https://access.redhat.com/errata/RHSA-2024:10178\n5. https://access.redhat.com/security/cve/CVE-2024-10492\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2322447", "creation_timestamp": "2025-02-26T05:26:43.000000Z"}