First published: Sun Dec 15 2019(Updated: )
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | <1.1.0.Beta1 | 1.1.0.Beta1 |
Keycloak | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3652 has a medium severity rating due to its potential for open redirect attacks.
To fix CVE-2014-3652, ensure that you upgrade to a version of Keycloak that addresses the open redirect vulnerability.
CVE-2014-3652 affects Keycloak versions up to 1.1.0.Beta1 and specifically version 1.0.1 of Red Hat Keycloak.
CVE-2014-3652 is classified as an open redirect vulnerability involving improper validation of redirect URLs.
Users of JBoss Keycloak versions that are affected may be impacted by CVE-2014-3652 if they do not implement proper URL validation.