Total vulnerabilities in the database
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
Software | From | Fixed in |
---|---|---|
![]() |
- | 23.0.3 |
redhat / keycloak | - | 22.0.7 |
redhat / openshift_container_platform | 4.11 | 4.11.x |
redhat / openshift_container_platform | 4.12 | 4.12.x |
redhat / openshift_container_platform_for_ibm_z | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_ibm_z | 4.10 | 4.10.x |
redhat / openshift_container_platform_for_linuxone | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_linuxone | 4.10 | 4.10.x |
redhat / openshift_container_platform_for_power | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_power | 4.10 | 4.10.x |
redhat / single_sign-on | 7.6 | 7.6.x |
redhat / migration_toolkit_for_applications | 6.0 | 6.0.x |
redhat / migration_toolkit_for_applications | 7.0 | 7.0.x |