Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3868 | issue tracking vendor advisory |
http://www.securityfocus.com/bid/108061 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2019:1140 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2998 | vendor advisory |