Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-6787

Опубликовано: 21 фев. 2024
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter their credentials. If the user cancels this re-authentication by selecting "Restart login," an account takeover may occur, as the new session, with a different SUB, will possess the same SID as the previous session.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Single Sign-On 7rh-sso7-keycloakWill not fix
Red Hat build of Keycloak 22rhbk/keycloak-operator-bundleFixedRHSA-2024:186716.04.2024
Red Hat build of Keycloak 22rhbk/keycloak-rhel9FixedRHSA-2024:186716.04.2024
Red Hat build of Keycloak 22rhbk/keycloak-rhel9-operatorFixedRHSA-2024:186716.04.2024
Red Hat build of Keycloak 22.0.10keycloak-coreFixedRHSA-2024:186816.04.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=2254375keycloak: session hijacking via re-authentication

EPSS

Процентиль: 59%
0.00385
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
почти 2 года назад

A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter their credentials. If the user cancels this re-authentication by selecting "Restart login," an account takeover may occur, as the new session, with a different SUB, will possess the same SID as the previous session.

CVSS3: 6.5
debian
почти 2 года назад

A flaw was found in Keycloak that occurs from an error in the re-authe ...

CVSS3: 6.5
github
почти 2 года назад

Keycloak vulnerable to session hijacking via re-authentication

CVSS3: 6.5
fstec
почти 2 года назад

Уязвимость программного средства для управления идентификацией и доступом Keycloak, связанная с недостатками процедуры аутентификации, позволяющая нарушителю перехватить активный сеанс

EPSS

Процентиль: 59%
0.00385
Низкий

6.5 Medium

CVSS3