CVE-2024-8883
19.09.2024, 16:15
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
Vendor | Product | Version |
---|---|---|
redhat | build_of_keycloak | - |
redhat | openshift_container_platform | 4.11 |
redhat | openshift_container_platform | 4.12 |
redhat | openshift_container_platform_for_ibm_z | 4.9 |
redhat | openshift_container_platform_for_ibm_z | 4.10 |
redhat | openshift_container_platform_for_linuxone | 4.9 |
redhat | openshift_container_platform_for_linuxone | 4.10 |
redhat | openshift_container_platform_for_power | 4.9 |
redhat | openshift_container_platform_for_power | 4.10 |
redhat | single_sign-on | - |
redhat | single_sign-on | 7.6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References