CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
AI Score
Confidence
Low
EPSS
Percentile
51.1%
Keycloak Services is vulnerable to Open Redirect. The vulnerability is due to the redirect_uri
validation logic within RedirectUtils.java
. This allows an attacker to steal an access token by bypassing the allowed host validation.
access.redhat.com/errata/RHSA-2023:7854
access.redhat.com/errata/RHSA-2023:7855
access.redhat.com/errata/RHSA-2023:7856
access.redhat.com/errata/RHSA-2023:7857
access.redhat.com/errata/RHSA-2023:7858
access.redhat.com/errata/RHSA-2023:7860
access.redhat.com/errata/RHSA-2023:7861
access.redhat.com/errata/RHSA-2024:0798
access.redhat.com/errata/RHSA-2024:0799
access.redhat.com/errata/RHSA-2024:0800
access.redhat.com/errata/RHSA-2024:0801
access.redhat.com/errata/RHSA-2024:0804
access.redhat.com/security/cve/CVE-2023-6291
bugzilla.redhat.com/show_bug.cgi?id=2251407
github.com/advisories/GHSA-mpwq-j3xf-7m5w
github.com/keycloak/keycloak/commit/1241bd291901667a13506d6fb123ba4344e618ee
github.com/keycloak/keycloak/issues/24792