After careful review of CVE-2024-5203, it has been determined that the issue is not exploitable in real-world scenarios. Moreover, the exploit assumes that the attacker has access to a session code parameter that matches a cookie on the Keycloak server. However the attacker does not have access to the cookie, and can therefore not craft a malicious request.
History

Fri, 13 Sep 2024 11:45:00 +0000


Fri, 13 Sep 2024 11:30:00 +0000

Type Values Removed Values Added
Title Keycloak: login csrf Keycloak: Login CSRF

Fri, 13 Sep 2024 10:30:00 +0000

Type Values Removed Values Added
Description A Cross-site request forgery (CSRF) flaw was found in Keycloak and occurs due to the lack of a unique token sent during the authentication POST request, /login-actions/authenticate. This flaw allows an attacker to craft a malicious login page and trick a legitimate user of an application into authenticating with an attacker-controlled account instead of their own. After careful review of CVE-2024-5203, it has been determined that the issue is not exploitable in real-world scenarios. Moreover, the exploit assumes that the attacker has access to a session code parameter that matches a cookie on the Keycloak server. However the attacker does not have access to the cookie, and can therefore not craft a malicious request.
CPEs cpe:/a:redhat:build_keycloak:22
cpe:/a:redhat:red_hat_single_sign_on:7
Vendors & Products Redhat
Redhat build Keycloak
Redhat red Hat Single Sign On

cve-icon MITRE

Status: REJECTED

Assigner: redhat

Published: 2024-06-12T08:51:59.518Z

Updated: 2024-09-13T10:15:30.617Z

Reserved: 2024-05-22T15:10:01.533Z

Link: CVE-2024-5203

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2024-06-12T09:15:20.647

Modified: 2024-09-13T11:15:10.197

Link: CVE-2024-5203

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-22T00:00:00Z

Links: CVE-2024-5203 - Bugzilla