GHSA-4vrx-8phj-x3mg – org.keycloak:keycloak-services
Package
Manager: maven
Name: org.keycloak:keycloak-services
Vulnerable Version: <0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Keycloak exposes sensitive information in Pushed Authorization Requests (PAR) ## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-69fp-7c8p-crjr. This link is maintained to preserve external references. ## Original Description A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.
Metadata
Created: 2024-06-03T18:30:50Z
Modified: 2024-07-30T23:52:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-4vrx-8phj-x3mg/GHSA-4vrx-8phj-x3mg.json
CWE IDs: ["CWE-200"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0