5.8
CVSSv2

CVE-2016-8609

Published: 01/08/2018 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

It was found that the keycloak prior to 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat keycloak

Vendor Advisories

Synopsis Important: Red Hat Single Sign-On security update Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 70 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
It was found that the keycloak did not implement authentication flow correctly An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session This could lead to information disclosure, or permit further possible attacks ...