CVE-2023-6291

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
redhatCNA
7.1 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
VendorProductVersion
redhatkeycloak
𝑥
< 22.0.7
redhatsingle_sign-on
-
redhatopenshift_container_platform
4.11
redhatopenshift_container_platform
4.12
redhatopenshift_container_platform_for_ibm_z
4.9
redhatopenshift_container_platform_for_ibm_z
4.10
redhatopenshift_container_platform_for_linuxone
4.9
redhatopenshift_container_platform_for_linuxone
4.10
redhatopenshift_container_platform_for_power
4.9
redhatopenshift_container_platform_for_power
4.10
redhatsingle_sign-on
7.6
redhatmigration_toolkit_for_applications
6.0
redhatmigration_toolkit_for_applications
7.0
𝑥
= Vulnerable software versions