Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-4540

Опубликовано: 03 июн. 2024
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a request_uri authorization request, possibly leading to an information disclosure vulnerability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Дополнительная информация

Статус:

Low
Дефект:
CWE-315->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2279303keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.

CVSS3: 7.5
debian
больше 1 года назад

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Request ...

CVSS3: 7.5
github
больше 1 года назад

Keycloak exposes sensitive information in Pushed Authorization Requests (PAR)

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость механизма авторизации OAuth 2.0 Pushed Authorization Requests программного средства для управления идентификацией и доступом Keycloak, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

7.5 High

CVSS3