First published: Fri Nov 24 2023(Updated: )
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | <23.0.3 | 23.0.3 |
Redhat Keycloak | <22.0.7 | |
Redhat Single Sign-on | ||
All of | ||
Any of | ||
Redhat Openshift Container Platform | =4.11 | |
Redhat Openshift Container Platform | =4.12 | |
Redhat Openshift Container Platform For Ibm Z | =4.9 | |
Redhat Openshift Container Platform For Ibm Z | =4.10 | |
Redhat Openshift Container Platform For Linuxone | =4.9 | |
Redhat Openshift Container Platform For Linuxone | =4.10 | |
Redhat Openshift Container Platform For Power | =4.9 | |
Redhat Openshift Container Platform For Power | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
All of | ||
Redhat Single Sign-on | =7.6 | |
Any of | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Migration Toolkit For Applications | =6.0 | |
Redhat Migration Toolkit For Applications | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.