GHSA-3p75-q5cc-qmj7 – org.keycloak:keycloak-parent
Package
Manager: maven
Name: org.keycloak:keycloak-parent
Vulnerable Version: <0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Keycloak Open Redirect vulnerability # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-9vm7-v8wj-3fqw. This link is maintained to preserve external references. # Original Description A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Metadata
Created: 2023-12-19T00:30:21Z
Modified: 2024-12-23T16:39:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-3p75-q5cc-qmj7/GHSA-3p75-q5cc-qmj7.json
CWE IDs: ["CWE-601"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0