Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-69fp-7c8p-crjr: Keycloak exposes sensitive information in Pushed Authorization Requests (PAR)

A flaw was found in Keycloak in the OAuth 2.0 Pushed Authorization Requests (PAR). Client provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server’s HTTP response to a request_uri authorization request. This could lead to an information disclosure vulnerability.

ghsa
#vulnerability#git#java#oauth#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-69fp-7c8p-crjr

Keycloak exposes sensitive information in Pushed Authorization Requests (PAR)

High severity GitHub Reviewed Published Jun 10, 2024 in keycloak/keycloak • Updated Jun 10, 2024

Package

maven org.keycloak:keycloak-services (Maven)

Affected versions

< 24.0.5

A flaw was found in Keycloak in the OAuth 2.0 Pushed Authorization Requests (PAR). Client provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server’s HTTP response to a request_uri authorization request. This could lead to an information disclosure vulnerability.

References

  • GHSA-69fp-7c8p-crjr
  • keycloak/keycloak@2191cc2

Published to the GitHub Advisory Database

Jun 10, 2024

Last updated

Jun 10, 2024

ghsa: Latest News

GHSA-27wf-5967-98gx: Kubernetes kubelet arbitrary command execution