CVE-2024-4540

CVSS V2 None CVSS V3 None
Description
A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.
Overview
  • CVE ID
  • CVE-2024-4540
  • Assigner
  • redhat
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2024-06-03T15:33:18.191Z
  • Last Modified Date
  • 2024-06-18T12:41:50.866Z
References
Reference URL Reference Tags
https://access.redhat.com/errata/RHSA-2024:3566 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3567 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3568 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3570 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3572 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3573 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3574 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3575 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:3576 vendor-advisory x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-4540 vdb-entry x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2279303 issue-tracking x_refsource_REDHAT
History
Created Old Value New Value Data Type Notes
2024-06-23 22:22:25 Added to TrackCVE