Skip to content

Keycloak exposes sensitive information in Pushed Authorization Requests (PAR)

High severity GitHub Reviewed Published Jun 10, 2024 in keycloak/keycloak • Updated Jun 10, 2024

Package

maven org.keycloak:keycloak-services (Maven)

Affected versions

< 24.0.5

Patched versions

24.0.5

Description

A flaw was found in Keycloak in the OAuth 2.0 Pushed Authorization Requests (PAR). Client provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a request_uri authorization request. This could lead to an information disclosure vulnerability.

References

@abstractj abstractj published to keycloak/keycloak Jun 10, 2024
Published to the GitHub Advisory Database Jun 10, 2024
Reviewed Jun 10, 2024
Last updated Jun 10, 2024

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-69fp-7c8p-crjr

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.