Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46507
HistoryApr 18, 2024 - 7:40 a.m.

Session Hijacking

2024-04-1807:40:53
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9
org.keycloak:keycloak-services
vulnerability
session hijacking
authentication
sid
account takeover

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

org.keycloak:keycloak-services is vulnerable to Session Hijacking. This vulnerability is due to an issue where an active Keycloak session can be hijacked by initiating a new authentication (using the query parameter prompt=login), prompting the user to enter their credentials again. If the user cancels this re-authentication by clicking “Restart login,” an account takeover could occur as the new session, with a different SUB, will have the same SID as the previous session.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%