Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-6927

Опубликовано: 18 дек. 2023
Источник: redhat
CVSS3: 4.6

Описание

A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.

Отчет

Red Hat rates this as a moderate, following the same case for CVE-2023-6134, but with another response mode with JSON Web Token.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2255027keycloak: open redirect via "form_post.jwt" JARM response mode

4.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.6
nvd
около 2 лет назад

A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.

CVSS3: 4.6
debian
около 2 лет назад

A flaw was found in Keycloak. This issue may allow an attacker to stea ...

CVSS3: 4.6
github
около 2 лет назад

keycloak-core: open redirect via "form_post.jwt" JARM response mode

4.6 Medium

CVSS3