CVE-2024-8883

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
redhatCNA
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
redhatbuild_of_keycloak
-
redhatopenshift_container_platform
4.11
redhatopenshift_container_platform
4.12
redhatopenshift_container_platform_for_ibm_z
4.9
redhatopenshift_container_platform_for_ibm_z
4.10
redhatopenshift_container_platform_for_linuxone
4.9
redhatopenshift_container_platform_for_linuxone
4.10
redhatopenshift_container_platform_for_power
4.9
redhatopenshift_container_platform_for_power
4.10
redhatsingle_sign-on
-
redhatsingle_sign-on
7.6
𝑥
= Vulnerable software versions