Description
Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0420 | Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session. |
Github GHSA |
GHSA-gc52-xj6p-9pxp | Exposure of Sensitive Information to an Unauthorized Actor in Keycloak |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:19:18.678Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3868
No data.
Status : Modified
Published: 2019-04-24T16:29:02.373
Modified: 2024-11-21T04:42:45.437
Link: CVE-2019-3868
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA