Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3868

Опубликовано: 23 апр. 2019
Источник: redhat
CVSS3: 3.8
EPSS Низкий

Описание

Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7keycloakWill not fix
Red Hat Mobile Application Platform 4keycloakOut of support scope
Red Hat OpenShift Application RuntimeskeycloakAffected
Red Hat support for Spring BootkeycloakAffected
streams for Apache KafkakeycloakNot affected
Red Hat Runtimes Spring Boot 2.1.12keycloakFixedRHSA-2020:236604.06.2020
Red Hat Single Sign-On 7.2.7 zipFixedRHSA-2019:086823.04.2019
Red Hat Single Sign-On 7.2 for RHEL 6rh-sso7-keycloakFixedRHSA-2019:085723.04.2019
Red Hat Single Sign-On 7.2 for RHEL 7rh-sso7-keycloakFixedRHSA-2019:085623.04.2019
Red Hat Single Sign-On 7.3.1 zipFixedRHSA-2019:114009.05.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1679144keycloak: session hijack using the user access token

EPSS

Процентиль: 52%
0.00291
Низкий

3.8 Low

CVSS3

Связанные уязвимости

CVSS3: 3.8
nvd
почти 7 лет назад

Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.

CVSS3: 3.8
debian
почти 7 лет назад

Keycloak up to version 6.0.0 allows the end user token (access or id t ...

CVSS3: 3.8
github
почти 7 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Keycloak

EPSS

Процентиль: 52%
0.00291
Низкий

3.8 Low

CVSS3