Severity
7.1HIGH
EPSS
0.2%
top 60.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 26
Latest updateJun 24

Description

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.7

Affected Packages4 packages

Also affects: Openshift Container Platform 4.11, 4.12, 4.10, 4.9

🔴Vulnerability Details

3
CVEList
Keycloak: redirect_uri validation bypass2024-01-26
OSV
The redirect_uri validation logic allows for bypassing explicitly allowed hosts that would otherwise be restricted2023-12-21
GHSA
The redirect_uri validation logic allows for bypassing explicitly allowed hosts that would otherwise be restricted2023-12-21

📋Vendor Advisories

3
Chrome
Stable Channel Update for Desktop: CVE-2024-62902024-06-24
Red Hat
keycloak: path traversal in the redirect validation2024-04-16
Red Hat
keycloak: redirect_uri validation bypass2023-12-14