vulnerability
Red Hat JBoss EAP: CVE-2024-8883: Open Redirect
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Sep 19, 2024 | Dec 20, 2024 | Jun 19, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Sep 19, 2024
Added
Dec 20, 2024
Modified
Jun 19, 2025
Description
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.. A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2024-8883
- https://attackerkb.com/topics/CVE-2024-8883
- URL-https://access.redhat.com/security/cve/CVE-2024-8883
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2312511
- URL-https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
- URL-https://access.redhat.com/errata/RHSA-2024:10385
- URL-https://access.redhat.com/errata/RHSA-2024:10386
- URL-https://access.redhat.com/errata/RHSA-2024:8823
- URL-https://access.redhat.com/errata/RHSA-2024:8824
- URL-https://access.redhat.com/errata/RHSA-2024:8826

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.