Session Hijacking Vulnerability in Keycloak by Red Hat
CVE-2023-6787

6.5MEDIUM

What is CVE-2023-6787?

A flaw in Keycloak's re-authentication mechanism can be exploited to hijack an active session. By initiating a new authentication process with the parameter 'prompt=login', users are prompted to re-enter their credentials. If a user cancels this re-authentication by selecting 'Restart login', an account takeover can occur. This is because the new session, generating a different SUB, retains the same SID as the previous session, enabling unauthorized access to the account.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.