A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "22.0.7"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-6291.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
}
]