A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
2024-09-19T16:15:06.403
2024-11-26T19:15:32.253
Modified
CVSSv3.1: 6.1 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | build_of_keycloak | - | Yes |
Application | redhat | openshift_container_platform | 4.11 | Yes |
Application | redhat | openshift_container_platform | 4.12 | Yes |
Application | redhat | openshift_container_platform_for_ibm_z | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_ibm_z | 4.10 | Yes |
Application | redhat | openshift_container_platform_for_linuxone | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_linuxone | 4.10 | Yes |
Application | redhat | openshift_container_platform_for_power | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_power | 4.10 | Yes |
Application | redhat | single_sign-on | - | Yes |
Application | redhat | single_sign-on | 7.6 | Yes |