First published: Mon Sep 16 2024(Updated: )
It is possible to configure Keycloak in such a manner that any application with a 'Valid Redirect URI' set to <a href="http://localhost">http://localhost</a> or <a href="http://127.0.0.1">http://127.0.0.1</a> can be redirected to an arbitrary URL of the attackers choosing. In the process sensitive information such as the authorization code can be exposed to the attacker, resulting in possible session hijacking.
Affected Software | Affected Version | How to fix |
---|---|---|
Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2312511 is considered high due to its potential for arbitrary URL redirection.
To fix REDHAT-BUG-2312511, ensure that the 'Valid Redirect URI' settings do not include localhost or 127.0.0.1 in any applications.
REDHAT-BUG-2312511 affects configurations in Red Hat Build of Keycloak.
REDHAT-BUG-2312511 allows attackers to redirect users to arbitrary URLs, potentially leading to phishing attacks.
Currently, there is no specific CVE associated with REDHAT-BUG-2312511.