CVE Published: 01/08/2018 |
CVE Updated: 06/08/2024 |
CVE Year: 2016 Source: redhat |
Vendor: Red Hat |
Product: keycloak Status : PUBLISHED
CVE-2016-8609 Description
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user\'s session. This could lead to information disclosure, or permit further possible attacks.