Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1945 | A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability. |
Github GHSA |
GHSA-69fp-7c8p-crjr | Keycloak exposes sensitive information in Pushed Authorization Requests (PAR) |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 13 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-12T20:11:25.640Z
Reserved: 2024-05-06T11:02:39.841Z
Link: CVE-2024-4540
Updated: 2024-08-01T20:40:47.507Z
Status : Awaiting Analysis
Published: 2024-06-03T16:15:08.993
Modified: 2024-11-21T09:43:04.063
Link: CVE-2024-4540
OpenCVE Enrichment
No data.
EUVD
Github GHSA