Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session.
{ "nvd_published_at": "2019-04-24T16:29:00Z", "github_reviewed_at": "2019-04-30T15:16:15Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-200" ] }