7.5

CVE-2024-4540

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
Package keycloak
Version < *
Version d5e82356f90893ca3b308a7e10020103e402369a
Status unaffected
VendorRed Hat
Product Red Hat Build of Keycloak
Default Statusunaffected
VendorRed Hat
Product Red Hat Build of Keycloak
Default Statusunaffected
VendorRed Hat
Product Red Hat build of Keycloak 22
Default Statusaffected
Version < *
Version 22.0.11-2
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 22
Default Statusaffected
Version < *
Version 22-15
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 22
Default Statusaffected
Version < *
Version 22-18
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 24
Default Statusaffected
Version < *
Version 24.0.5-2
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 24
Default Statusaffected
Version < *
Version 24-10
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 24
Default Statusaffected
Version < *
Version 24-10
Status unaffected
VendorRed Hat
Product Red Hat Single Sign-On 7
Default Statusunaffected
VendorRed Hat
Product Red Hat Single Sign-On 7.6 for RHEL 7
Default Statusaffected
Version < *
Version 0:18.0.14-1.redhat_00001.1.el7sso
Status unaffected
VendorRed Hat
Product Red Hat Single Sign-On 7.6 for RHEL 8
Default Statusaffected
Version < *
Version 0:18.0.14-1.redhat_00001.1.el8sso
Status unaffected
VendorRed Hat
Product Red Hat Single Sign-On 7.6 for RHEL 9
Default Statusaffected
Version < *
Version 0:18.0.14-1.redhat_00001.1.el9sso
Status unaffected
VendorRed Hat
Product RHEL-8 based Middleware Containers
Default Statusaffected
Version < *
Version 7.6-49
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.38% 0.586
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.