Hide Forgot
Keycloak allows end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.
This issue has been addressed in the following products: Red Hat Single Sign-On 7.2 for RHEL 7 Via RHSA-2019:0856 https://access.redhat.com/errata/RHSA-2019:0856
This issue has been addressed in the following products: Red Hat Single Sign-On 7.2 for RHEL 6 Via RHSA-2019:0857 https://access.redhat.com/errata/RHSA-2019:0857
This issue has been addressed in the following products: Red Hat Single Sign-On 7.2.7 zip Via RHSA-2019:0868 https://access.redhat.com/errata/RHSA-2019:0868
Acknowledgments: Name: Siddiqui Najam (Gemalto E&C), Caranzo Gideon (Gemalto E&C), Muzamil Muein (Gemalto E&C)
This issue has been addressed in the following products: Red Hat Single Sign-On 7.3.1 zip Via RHSA-2019:1140 https://access.redhat.com/errata/RHSA-2019:1140
This vulnerability is out of security support scope for the following product: * Red Hat Mobile Application Platform Please refer to https://access.redhat.com/support/policy/updates/rhmap for more details
This issue has been addressed in the following products: Red Hat Openshift Application Runtimes Via RHSA-2019:2998 https://access.redhat.com/errata/RHSA-2019:2998
This issue has been addressed in the following products: Red Hat Runtimes Spring Boot 2.1.12 Via RHSA-2020:2366 https://access.redhat.com/errata/RHSA-2020:2366