CVE-2016-8609Session Fixation in Redhat Keycloak

Severity
8.1HIGHNVD
CNA3.7
EPSS
0.1%
top 64.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateOct 18

Description

It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2

Affected Packages2 packages

NVDredhat/keycloak< 2.3.0
CVEListV5red_hat/keycloak2.3.0

🔴Vulnerability Details

3
OSV
Improper Authentication in org.keycloak:keycloak-core2018-10-18
GHSA
Improper Authentication in org.keycloak:keycloak-core2018-10-18
CVEList
CVE-2016-8609: It was found that the keycloak before 22018-08-01

📋Vendor Advisories

1
Red Hat
keycloak: account hijacking via auth code fixation2016-12-13

💬Community

1
Bugzilla
CVE-2016-8609 keycloak: account hijacking via auth code fixation2016-10-19
CVE-2016-8609 — Session Fixation in Redhat Keycloak | cvebase