Описание
Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.
Ссылки
- Third Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Issue TrackingVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.0.0 (включая)
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.00291
Низкий
3.8 Low
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-200
CWE-200
Связанные уязвимости
CVSS3: 3.8
redhat
почти 7 лет назад
Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.
CVSS3: 3.8
debian
почти 7 лет назад
Keycloak up to version 6.0.0 allows the end user token (access or id t ...
CVSS3: 3.8
github
почти 7 лет назад
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak
EPSS
Процентиль: 52%
0.00291
Низкий
3.8 Low
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-200
CWE-200