Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-6920

Опубликовано: 18 дек. 2023
Источник: redhat
CVSS3: 0

Описание

An incomplete fix was found in the Keycloak Core patch. An attacker can steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt". Changing the response_mode parameter in the original proof of concept from "form_post" to "form_post.jwt" can bypass the security patch implemented to address CVE-2023-6134.

Отчет

This flaw was found to be a duplicate of CVE-2023-6927. Please see https://access.redhat.com/security/cve/CVE-2023-6927 for information about affected products and security errata.

Меры по смягчению последствий

No current mitigation is available for this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Build of Keycloakkeycloak-coreAffected
Red Hat Single Sign-On 7rh-sso7-keycloakAffected

Показывать по

Дополнительная информация

Дефект:
CWE-75
https://bugzilla.redhat.com/show_bug.cgi?id=2255024keycloak-core: Reflected XSS via wildcard in OIDC redirect_uri. Incomplete fix of CVE-2023-6134

0 Low

CVSS3

Связанные уязвимости

nvd
около 2 лет назад

Rejected reason: This flaw was found to be a duplicate of CVE-2023-6927. Please see https://access.redhat.com/security/cve/CVE-2023-6927 for information about affected products and security errata.

github
около 2 лет назад

Rejected reason: This flaw was found to be a duplicate of CVE-2023-6927. Please see https://access.redhat.com/security/cve/CVE-2023-6927 for information about affected products and security errata.

0 Low

CVSS3