Lucene search

K
nvd[email protected]NVD:CVE-2023-6291
HistoryJan 26, 2024 - 3:15 p.m.

CVE-2023-6291

2024-01-2615:15:08
CWE-601
web.nvd.nist.gov
1
flaw
keycloak
redirect_uri
validation logic
access token
theft
attacker
impersonate
users

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

42.6%

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.

Affected configurations

NVD
Node
redhatkeycloakRange<22.0.7
OR
redhatsingle_sign-onMatch-text-only
Node
redhatopenshift_container_platformMatch4.11
OR
redhatopenshift_container_platformMatch4.12
OR
redhatopenshift_container_platform_for_ibm_zMatch4.9
OR
redhatopenshift_container_platform_for_ibm_zMatch4.10
OR
redhatopenshift_container_platform_for_linuxoneMatch4.9
OR
redhatopenshift_container_platform_for_linuxoneMatch4.10
OR
redhatopenshift_container_platform_for_powerMatch4.9
OR
redhatopenshift_container_platform_for_powerMatch4.10
AND
redhatenterprise_linuxMatch8.0
Node
redhatsingle_sign-onMatch7.6
AND
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
Node
redhatmigration_toolkit_for_applicationsMatch6.0
OR
redhatmigration_toolkit_for_applicationsMatch7.0

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

42.6%