Session Hijacking Vulnerability in Keycloak by Red Hat
CVE-2023-6787
6.5MEDIUM
Key Information:
- Vendor
- CVE Published:
- 25 April 2024
What is CVE-2023-6787?
A flaw in Keycloak's re-authentication mechanism can be exploited to hijack an active session. By initiating a new authentication process with the parameter 'prompt=login', users are prompted to re-enter their credentials. If a user cancels this re-authentication by selecting 'Restart login', an account takeover can occur. This is because the new session, generating a different SUB, retains the same SID as the previous session, enabling unauthorized access to the account.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
