CVE-2016-8609
01.08.2018, 17:29
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | keycloak | 𝑥 < 2.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-384 - Session FixationAuthenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
- CWE-287 - Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
References