Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2024-8883
Disclosure Date: September 19, 2024 (last updated January 12, 2025)
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
0
Attacker Value
Unknown
CVE-2024-4629
Disclosure Date: September 03, 2024 (last updated September 17, 2024)
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
0
Attacker Value
Unknown
CVE-2023-6291
Disclosure Date: January 26, 2024 (last updated October 22, 2024)
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
0
Attacker Value
Unknown
CVE-2023-2585
Disclosure Date: December 21, 2023 (last updated May 03, 2024)
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
0
Attacker Value
Unknown
CVE-2023-6134
Disclosure Date: December 14, 2023 (last updated June 12, 2024)
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
0
Attacker Value
Unknown
CVE-2022-4039
Disclosure Date: September 22, 2023 (last updated May 03, 2024)
A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
0
Attacker Value
Unknown
CVE-2022-3916
Disclosure Date: September 20, 2023 (last updated May 03, 2024)
A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
0
Attacker Value
Unknown
CVE-2023-0264
Disclosure Date: August 04, 2023 (last updated October 08, 2023)
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2023-3089
Disclosure Date: July 05, 2023 (last updated October 08, 2023)
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
0
Attacker Value
Unknown
CVE-2023-0056
Disclosure Date: March 23, 2023 (last updated October 08, 2023)
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
0