Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-0420 | Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session. |
![]() |
GHSA-gc52-xj6p-9pxp | Exposure of Sensitive Information to an Unauthorized Actor in Keycloak |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:19:18.678Z
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3868

No data.

Status : Modified
Published: 2019-04-24T16:29:02.373
Modified: 2024-11-21T04:42:45.437
Link: CVE-2019-3868


No data.