CVE-2024-4540

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.
CVSS

No CVSS.

Configurations

No configuration.

History

03 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:3570 -
  • () https://access.redhat.com/errata/RHSA-2024:3568 -
  • () https://access.redhat.com/errata/RHSA-2024:3572 -
  • () https://access.redhat.com/errata/RHSA-2024:3566 -
  • () https://access.redhat.com/errata/RHSA-2024:3567 -
  • () https://access.redhat.com/errata/RHSA-2024:3574 -
  • () https://access.redhat.com/errata/RHSA-2024:3575 -
  • () https://access.redhat.com/errata/RHSA-2024:3573 -
  • () https://access.redhat.com/errata/RHSA-2024:3576 -

03 Jun 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-03 16:15

Updated : 2024-06-03 23:15


NVD link : CVE-2024-4540

Mitre link : CVE-2024-4540


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor