Описание
It was found that Keycloak's account console, up to 6.0.1, did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.
Ссылки
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.0.1 (включая)
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
EPSS
Процентиль: 27%
0.00095
Низкий
4.6 Medium
CVSS3
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352
CWE-352
Связанные уязвимости
CVSS3: 4.6
redhat
больше 6 лет назад
It was found that Keycloak's account console, up to 6.0.1, did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.
CVSS3: 8.8
debian
больше 6 лет назад
It was found that Keycloak's account console, up to 6.0.1, did not per ...
CVSS3: 8.8
github
больше 6 лет назад
Improper Input Validation and Cross-Site Request Forgery in Keycloak
EPSS
Процентиль: 27%
0.00095
Низкий
4.6 Medium
CVSS3
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352
CWE-352