
We found results for “”
CVE-2024-4540
Good to know:


Date: June 3, 2024
A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.
Language: Java
Severity Score
Related Resources (16)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version org.keycloak:keycloak-services:16.1.0;org.keycloak:keycloak-services:24.0.5;org.keycloak:keycloak-services:4.2.0.Final;org.keycloak:keycloak-services:24.0.5;org.keycloak:keycloak-services:24.0.5;org.keycloak:keycloak-services:1.8.0.CR2;org.keycloak:keycloak-services:1.5.0-Final;org.keycloak:keycloak-services:1.6.0.Final;org.keycloak:keycloak-services:1.0-beta-1-20150521;org.keycloak:keycloak-services:3.3.0.CR2;org.jboss.aerogear.unifiedpush:unifiedpush-auth-server:1.0.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |