Lucene search

K
redhatcveRedhat.comRH:CVE-2023-6291
HistoryDec 14, 2023 - 6:01 p.m.

CVE-2023-6291

2023-12-1418:01:10
redhat.com
access.redhat.com
41
keycloak
redirect_uri
validation
access token
theft
security flaw
bypass
stolen
impersonation
red hat
product security
mitigation
criteria
ease of use
deployment
applicability
stability

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

42.6%

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

42.6%