logo

CVE-2019-3868 org.keycloak:keycloak-core

Package

Manager: maven
Name: org.keycloak:keycloak-core
Vulnerable Version: >=0 <6.0.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00291 pctl0.52067

Details

Exposure of Sensitive Information to an Unauthorized Actor in Keycloak Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session.

Metadata

Created: 2019-04-30T15:37:21Z
Modified: 2021-08-03T21:24:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/04/GHSA-gc52-xj6p-9pxp/GHSA-gc52-xj6p-9pxp.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-gc52-xj6p-9pxp
Finding: F017
Auto approve: 1