Описание
A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Отчет
Red Hat rates this as a moderate, following the same case for CVE-2023-6134, but with another response mode with JSON Web Token.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Дополнительная информация
Статус:
4.6 Medium
CVSS3
Связанные уязвимости
A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
A flaw was found in Keycloak. This issue may allow an attacker to stea ...
keycloak-core: open redirect via "form_post.jwt" JARM response mode
4.6 Medium
CVSS3