Описание
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Migration Toolkit for Applications 6 | keycloak | Will not fix | ||
| Migration Toolkit for Applications 7 | keycloak | Not affected | ||
| OpenShift Serverless | keycloak | Not affected | ||
| Red Hat Data Grid 8 | keycloak | Not affected | ||
| Red Hat Decision Manager 7 | keycloak | Not affected | ||
| Red Hat Fuse 7 | keycloak | Not affected | ||
| Red Hat JBoss Data Grid 7 | keycloak | Not affected | ||
| Red Hat JBoss Enterprise Application Platform 6 | rh-sso7-keycloak | Not affected | ||
| Red Hat Process Automation 7 | keycloak | Not affected | ||
| Red Hat build of Keycloak 22 | rhbk/keycloak-operator-bundle | Fixed | RHSA-2023:7861 | 14.12.2023 |
Показывать по
Дополнительная информация
Статус:
7.1 High
CVSS3
Связанные уязвимости
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
A flaw was found in the redirect_uri validation logic in Keycloak. Thi ...
The redirect_uri validation logic allows for bypassing explicitly allowed hosts that would otherwise be restricted
7.1 High
CVSS3