First published: Mon Dec 18 2023(Updated: )
# Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-9vm7-v8wj-3fqw. This link is maintained to preserve external references. # Original Description A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <23.0.4 | 23.0.4 |
maven/org.keycloak:keycloak-parent | <=23.0.3 | |
maven/org.keycloak:keycloak-core | <23.0.4 | 23.0.4 |
Red Hat Keycloak | ||
Red Hat Single Sign-On | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6927 has been classified as a high severity vulnerability.
To fix CVE-2023-6927, you should upgrade Keycloak to version 23.0.4 or later.
Keycloak versions prior to 23.0.4, including 23.0.3 and earlier versions, are affected by CVE-2023-6927.
CVE-2023-6927 is a vulnerability that may allow an attacker to steal authorization codes or tokens.
Yes, a patch is available in Keycloak version 23.0.4 to address CVE-2023-6927.