Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9vm7-v8wj-3fqw

Опубликовано: 23 янв. 2024
Источник: github
Github: Прошло ревью
CVSS3: 4.6

Описание

keycloak-core: open redirect via "form_post.jwt" JARM response mode

An incomplete fix was found in Keycloak Core patch. An attacker can steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt". It is observed that changing the response_mode parameter in the original proof of concept from "form_post" to "form_post.jwt" can bypass the security patch implemented to address CVE-2023-6134.

Пакеты

Наименование

org.keycloak:keycloak-core

maven
Затронутые версииВерсия исправления

< 23.0.4

23.0.4

EPSS

Процентиль: 74%
0.00838
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 4.6
redhat
около 2 лет назад

A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.

CVSS3: 4.6
nvd
около 2 лет назад

A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.

CVSS3: 4.6
debian
около 2 лет назад

A flaw was found in Keycloak. This issue may allow an attacker to stea ...

EPSS

Процентиль: 74%
0.00838
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-601