{"vulnerability": "CVE-2024-11736", "sightings": [{"uuid": "4ceff9de-014f-4b90-bd4c-78d4d244ac5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11736", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfow2r7jb42j", "content": "", "creation_timestamp": "2025-01-14T09:15:45.684528Z"}, {"uuid": "e16d7bb6-862a-4f5f-8e22-3f71cd8d2269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11736", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfoxucd2uv2h", "content": "", "creation_timestamp": "2025-01-14T09:47:56.436021Z"}, {"uuid": "74501673-edcf-4989-b394-b83e9bd0264e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11736", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113825801178667187", "content": "", "creation_timestamp": "2025-01-14T08:38:10.666674Z"}, {"uuid": "b33ed924-fb0e-45a7-a64f-86feaac750b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11736", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1464", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11736\n\ud83d\udd39 Description: A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.\n\ud83d\udccf Published: 2025-01-14T08:36:08.583Z\n\ud83d\udccf Modified: 2025-01-14T08:36:08.583Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:0299\n2. https://access.redhat.com/errata/RHSA-2025:0300\n3. https://access.redhat.com/security/cve/CVE-2024-11736\n4. https://bugzilla.redhat.com/show_bug.cgi?id=2328850", "creation_timestamp": "2025-01-14T09:10:34.000000Z"}, {"uuid": "533f9279-8f56-41fc-8844-c793908d3ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11736", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8065", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11736\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.\n\ud83d\udccf Published: 2025-01-14T08:36:08.583Z\n\ud83d\udccf Modified: 2025-03-19T14:52:27.254Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:0299\n2. https://access.redhat.com/errata/RHSA-2025:0300\n3. https://access.redhat.com/security/cve/CVE-2024-11736\n4. https://bugzilla.redhat.com/show_bug.cgi?id=2328850", "creation_timestamp": "2025-03-19T15:17:50.000000Z"}, {"uuid": "a1e9cabd-db22-4b67-99ed-6566dc126f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11736", "type": "seen", "source": "https://t.me/cvedetector/15237", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11736 - Keycloak Server Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11736 \nPublished : Jan. 14, 2025, 9:15 a.m. | 17\u00a0minutes ago \nDescription : A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T10:38:37.000000Z"}]}