Vulnerability Details CVE-2016-8609
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 38.7%
CVSS Severity
CVSS v3 Score 3.7
CVSS v2 Score 5.8
Products affected by CVE-2016-8609
-
cpe:2.3:a:redhat:keycloak:-
-
cpe:2.3:a:redhat:keycloak:1.0
-
cpe:2.3:a:redhat:keycloak:1.0.0
-
cpe:2.3:a:redhat:keycloak:1.0.1
-
cpe:2.3:a:redhat:keycloak:1.0.2
-
cpe:2.3:a:redhat:keycloak:1.0.3
-
cpe:2.3:a:redhat:keycloak:1.0.4
-
cpe:2.3:a:redhat:keycloak:1.0.5
-
cpe:2.3:a:redhat:keycloak:1.1.0
-
cpe:2.3:a:redhat:keycloak:1.1.1
-
cpe:2.3:a:redhat:keycloak:1.2.0
-
cpe:2.3:a:redhat:keycloak:1.3.0
-
cpe:2.3:a:redhat:keycloak:1.3.1
-
cpe:2.3:a:redhat:keycloak:1.4.0
-
cpe:2.3:a:redhat:keycloak:1.5.0
-
cpe:2.3:a:redhat:keycloak:1.5.1
-
cpe:2.3:a:redhat:keycloak:1.6.0
-
cpe:2.3:a:redhat:keycloak:1.6.1
-
cpe:2.3:a:redhat:keycloak:1.7.0
-
cpe:2.3:a:redhat:keycloak:1.8.0
-
cpe:2.3:a:redhat:keycloak:1.8.1
-
cpe:2.3:a:redhat:keycloak:1.8.2
-
cpe:2.3:a:redhat:keycloak:1.9.0
-
cpe:2.3:a:redhat:keycloak:1.9.1
-
cpe:2.3:a:redhat:keycloak:1.9.2
-
cpe:2.3:a:redhat:keycloak:1.9.3
-
cpe:2.3:a:redhat:keycloak:1.9.4
-
cpe:2.3:a:redhat:keycloak:1.9.5
-
cpe:2.3:a:redhat:keycloak:1.9.6
-
cpe:2.3:a:redhat:keycloak:1.9.7
-
cpe:2.3:a:redhat:keycloak:1.9.8
-
cpe:2.3:a:redhat:keycloak:2.0.0
-
cpe:2.3:a:redhat:keycloak:2.1.0
-
cpe:2.3:a:redhat:keycloak:2.2.0
-
cpe:2.3:a:redhat:keycloak:2.2.1