Project Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
Build Keycloak
Subscribe
Enterprise Linux
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Enterprise Brms Platform
Subscribe
Jboss Fuse
Subscribe
Keycloak
Subscribe
Migration Toolkit Applications
Subscribe
Migration Toolkit For Applications
Subscribe
Openshift Container Platform
Subscribe
Openshift Container Platform For Ibm Z
Subscribe
Openshift Container Platform For Linuxone
Subscribe
Openshift Container Platform For Power
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
Serverless
Subscribe
Single Sign-on
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3249 | A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users. |
Github GHSA |
GHSA-mpwq-j3xf-7m5w | The redirect_uri validation logic allows for bypassing explicitly allowed hosts that would otherwise be restricted |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Wed, 13 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-11T16:12:14.005Z
Reserved: 2023-11-24T18:16:45.923Z
Link: CVE-2023-6291
Updated: 2024-08-02T08:28:21.867Z
Status : Modified
Published: 2024-01-26T15:15:08.280
Modified: 2024-11-21T08:43:32.587
Link: CVE-2023-6291
OpenCVE Enrichment
No data.
EUVD
Github GHSA