It was found that the keycloak did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
Name: Hiroyuki Wada (Nomura Research Institute)
This issue has been addressed in the following products:
Red Hat Single Sign-On 7.0
Via RHSA-2016:2945 https://rhn.redhat.com/errata/RHSA-2016-2945.html