CVE-2016-8609

It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
CVSS v2 : 5.8
v3 : 8.1
v2 : 5.8
v3 : 3.7
References () http://rhn.redhat.com/errata/RHSA-2016-2945.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2016-2945.html - Vendor Advisory
References () http://www.securityfocus.com/bid/95070 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95070 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037460 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037460 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8609 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8609 - Issue Tracking, Vendor Advisory

Information

Published : 2018-08-01 17:29

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8609

Mitre link : CVE-2016-8609

CVE.ORG link : CVE-2016-8609


JSON object : View

Products Affected

redhat

  • keycloak
CWE
CWE-384

Session Fixation

CWE-287

Improper Authentication