Keycloak vulnerable to session hijacking via re-authentication
Moderate severity
GitHub Reviewed
Published
Apr 17, 2024
in
keycloak/keycloak
•
Updated Apr 25, 2024
Package
Affected versions
< 22.0.10
>= 23.0.0, < 24.0.3
Patched versions
22.0.10
24.0.3
Description
Published to the GitHub Advisory Database
Apr 17, 2024
Reviewed
Apr 17, 2024
Published by the National Vulnerability Database
Apr 25, 2024
Last updated
Apr 25, 2024
A flaw was found in Keycloak. An active keycloak session can be hijacked by initiating a new authentication (having the query parameter prompt=login) and forcing the user to enter his credentials once again. If the user cancels this re-authentication by clicking Restart login, the account takeover could take place as the new session, with a different SUB, will have the same SID as the previous session.
References