CVE-2019-3868 – org.keycloak:keycloak-core
Package
Manager: maven
Name: org.keycloak:keycloak-core
Vulnerable Version: >=0 <6.0.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00291 pctl0.52067
Details
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session.
Metadata
Created: 2019-04-30T15:37:21Z
Modified: 2021-08-03T21:24:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/04/GHSA-gc52-xj6p-9pxp/GHSA-gc52-xj6p-9pxp.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-gc52-xj6p-9pxp
Finding: F017
Auto approve: 1