A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
Workaround:
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:7854 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7855 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7856 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7857 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7858 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7860 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7861 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0798 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0799 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0800 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0801 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0804 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-6291 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2251407 | vendor advisory issue tracking |