First published: Mon Dec 18 2023(Updated: )
# Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-9vm7-v8wj-3fqw. This link is maintained to preserve external references. # Original Description A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <23.0.4 | 23.0.4 |
maven/org.keycloak:keycloak-parent | <=23.0.3 | |
maven/org.keycloak:keycloak-core | <23.0.4 | 23.0.4 |
Redhat Keycloak | ||
Red Hat Single Sign-On | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.