CVE-2023-6291

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:migration_toolkit_for_applications:7.0:*:*:*:*:*:*:*

History

14 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:0798 -
  • () https://access.redhat.com/errata/RHSA-2024:0799 -
  • () https://access.redhat.com/errata/RHSA-2024:0800 -
  • () https://access.redhat.com/errata/RHSA-2024:0801 -
  • () https://access.redhat.com/errata/RHSA-2024:0804 -

06 Feb 2024, 16:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 7.1

04 Feb 2024, 20:15

Type Values Removed Values Added
CWE CWE-20

03 Feb 2024, 01:42

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2023:7854 - () https://access.redhat.com/errata/RHSA-2023:7854 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7855 - () https://access.redhat.com/errata/RHSA-2023:7855 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7856 - () https://access.redhat.com/errata/RHSA-2023:7856 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7857 - () https://access.redhat.com/errata/RHSA-2023:7857 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7858 - () https://access.redhat.com/errata/RHSA-2023:7858 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7860 - () https://access.redhat.com/errata/RHSA-2023:7860 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7861 - () https://access.redhat.com/errata/RHSA-2023:7861 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-6291 - () https://access.redhat.com/security/cve/CVE-2023-6291 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2251407 - () https://bugzilla.redhat.com/show_bug.cgi?id=2251407 - Issue Tracking, Vendor Advisory
CWE CWE-601
First Time Redhat enterprise Linux
Redhat keycloak
Redhat openshift Container Platform For Ibm Z
Redhat single Sign-on
Redhat
Redhat migration Toolkit For Applications
Redhat openshift Container Platform For Linuxone
Redhat openshift Container Platform
Redhat openshift Container Platform For Power
Summary
  • (es) Se encontró un fallo en la lógica de validación de redirect_uri en Keycloak. Este problema puede permitir la omisión de hosts permitidos explícitamente. Un ataque exitoso puede provocar el robo de un token de acceso, lo que hace posible que el atacante se haga pasar por otros usuarios.
CPE cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:migration_toolkit_for_applications:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 6.1

26 Jan 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-26 15:15

Updated : 2024-02-14 03:15


NVD link : CVE-2023-6291

Mitre link : CVE-2023-6291

CVE.ORG link : CVE-2023-6291


JSON object : View

Products Affected

redhat

  • openshift_container_platform_for_ibm_z
  • migration_toolkit_for_applications
  • enterprise_linux
  • openshift_container_platform_for_power
  • openshift_container_platform_for_linuxone
  • single_sign-on
  • openshift_container_platform
  • keycloak
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')