It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2018-08-01T17:00:00

Updated: 2024-08-06T02:27:41.009Z

Reserved: 2016-10-12T00:00:00

Link: CVE-2016-8609

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-01T17:29:00.253

Modified: 2023-11-07T02:36:23.600

Link: CVE-2016-8609

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-12-13T00:00:00Z

Links: CVE-2016-8609 - Bugzilla