Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-w8gr-xwp4-r9f7: Vulnerable Redirect URI Validation Results in Open Redirect

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a ‘Valid Redirect URI’ is set to http://localhost/ or http://127.0.0.1/, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

ghsa
#git#java#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-w8gr-xwp4-r9f7

Vulnerable Redirect URI Validation Results in Open Redirect

Moderate severity GitHub Reviewed Published Oct 14, 2024 in keycloak/keycloak • Updated Oct 14, 2024

Package

maven org.keycloak:keycloak-services (Maven)

Affected versions

<= 22.0.12

>= 23.0.0, <= 24.0.7

>= 25.0.0, <= 25.0.5

Patched versions

22.0.13

24.0.8

25.0.6

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a ‘Valid Redirect URI’ is set to http://localhost/ or http://127.0.0.1/, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

References

  • GHSA-w8gr-xwp4-r9f7

Published to the GitHub Advisory Database

Oct 14, 2024

Last updated

Oct 14, 2024

ghsa: Latest News

GHSA-27wf-5967-98gx: Kubernetes kubelet arbitrary command execution