Lucene search

K
githubGitHub Advisory DatabaseGHSA-VVF8-2H68-9475
HistorySep 19, 2024 - 6:30 p.m.

Keycloak Open Redirect vulnerability

2024-09-1918:30:52
CWE-601
GitHub Advisory Database
github.com
6
keycloak
misconfiguration flaw
open redirect
vulnerability
arbitrary url
valid redirect uri
sensitive information
authorization codes
session hijacking
software

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

Low

EPSS

0.005

Percentile

76.5%

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a ‘Valid Redirect URI’ is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

Affected configurations

Vulners
Node
org.keycloakkeycloak-servicesRange<25.0.6
VendorProductVersionCPE
org.keycloakkeycloak-services*cpe:2.3:a:org.keycloak:keycloak-services:*:*:*:*:*:*:*:*

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

Low

EPSS

0.005

Percentile

76.5%