Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gc52-xj6p-9pxp

Опубликовано: 30 апр. 2019
Источник: github
Github: Прошло ревью
CVSS3: 3.8

Описание

Exposure of Sensitive Information to an Unauthorized Actor in Keycloak

Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session.

Пакеты

Наименование

org.keycloak:keycloak-core

maven
Затронутые версииВерсия исправления

< 6.0.0

6.0.0

EPSS

Процентиль: 52%
0.00291
Низкий

3.8 Low

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 3.8
redhat
почти 7 лет назад

Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.

CVSS3: 3.8
nvd
почти 7 лет назад

Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.

CVSS3: 3.8
debian
почти 7 лет назад

Keycloak up to version 6.0.0 allows the end user token (access or id t ...

EPSS

Процентиль: 52%
0.00291
Низкий

3.8 Low

CVSS3

Дефекты

CWE-200