A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Workaround:
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:0094 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0095 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0096 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0097 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0098 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0100 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0101 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0798 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0799 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0800 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0801 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0804 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-6927 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2255027 | vendor advisory issue tracking |