Vulnerability Description
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Keycloak | < 2.3.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2016-2945.htmlVendor Advisory
- http://www.securityfocus.com/bid/95070Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037460Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8609Issue TrackingVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2945.htmlVendor Advisory
- http://www.securityfocus.com/bid/95070Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037460Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8609Issue TrackingVendor Advisory
FAQ
What is CVE-2016-8609?
CVE-2016-8609 is a vulnerability with a CVSS score of 3.7 (LOW). It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session....
How severe is CVE-2016-8609?
CVE-2016-8609 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-8609?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Keycloak.