A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
References
Configurations
History
14 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Dec 2023, 20:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255027 - Issue Tracking, Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2023-6927 - Vendor Advisory | |
First Time |
Redhat
Redhat keycloak Redhat single Sign-on |
|
CPE | cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CWE | CWE-601 |
19 Dec 2023, 13:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-18 23:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-6927
Mitre link : CVE-2023-6927
CVE.ORG link : CVE-2023-6927
JSON object : View
Products Affected
redhat
- single_sign-on
- keycloak
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')