Skip to content

Exposure of sensitive information in Pushed Authorization Requests (PAR)

High
abstractj published GHSA-69fp-7c8p-crjr Jun 10, 2024

Package

maven org.keycloak:keycloak-services (Maven)

Affected versions

< 24.0.5

Patched versions

24.0.5

Description

A flaw was found in Keycloak in the OAuth 2.0 Pushed Authorization Requests (PAR). Client provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a request_uri authorization request. This could lead to an information disclosure vulnerability.

Severity

High

CVE ID

CVE-2024-4540

Weaknesses

Insecure Storage of Sensitive Information

The product stores sensitive information without properly limiting read or write access by unauthorized actors. Learn more on MITRE.

Credits