First published: Mon Sep 16 2024(Updated: )
# Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-w8gr-xwp4-r9f7. This link is maintained to preserve external references. # Original Description A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | >=25.0.0<=25.0.5 | 25.0.6 |
maven/org.keycloak:keycloak-services | >=23.0.0<=24.0.7 | 24.0.8 |
maven/org.keycloak:keycloak-services | <=22.0.12 | 22.0.13 |
maven/org.keycloak:keycloak-services | <25.0.6 | 25.0.6 |
Red Hat Keycloak | ||
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat OpenShift Container Platform for Power | =4.9 | |
Red Hat OpenShift Container Platform for Power | =4.10 | |
Red Hat Single Sign-On | ||
Red Hat Single Sign-On | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8883 has not been assigned a specific severity level due to its withdrawal as a duplicate.
To remediate CVE-2024-8883, upgrade the affected Keycloak services to version 25.0.6, 24.0.8, or 22.0.13 as appropriate.
CVE-2024-8883 affects Keycloak versions from 23.0.0 to 25.0.5 and from 22.0.0 to 22.0.12.
There are no officially stated workarounds for CVE-2024-8883; updating to a fixed version is recommended.
Organizations should verify their Keycloak installation and ensure they are running the recommended patched versions to mitigate any potential risks.