CVE-2023-6927
Severity CVSS v4.0:
Pending analysis
Type:
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Publication date:
18/12/2023
Last modified:
14/02/2024
Description
A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:0094
- https://access.redhat.com/errata/RHSA-2024:0095
- https://access.redhat.com/errata/RHSA-2024:0096
- https://access.redhat.com/errata/RHSA-2024:0097
- https://access.redhat.com/errata/RHSA-2024:0098
- https://access.redhat.com/errata/RHSA-2024:0100
- https://access.redhat.com/errata/RHSA-2024:0101
- https://access.redhat.com/errata/RHSA-2024:0798
- https://access.redhat.com/errata/RHSA-2024:0799
- https://access.redhat.com/errata/RHSA-2024:0800
- https://access.redhat.com/errata/RHSA-2024:0801
- https://access.redhat.com/errata/RHSA-2024:0804
- https://access.redhat.com/security/cve/CVE-2023-6927
- https://bugzilla.redhat.com/show_bug.cgi?id=2255027



