First published: Mon Dec 18 2023(Updated: )
A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-parent | <=23.0.3 | |
Redhat Keycloak | ||
Redhat Single Sign-on | =7.0 | |
redhat/keycloak | <23.0.4 | 23.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.