Improper Authentication in Keycloak - CVE-2016-8609
Published: August 1, 2018 / Updated: August 8, 2020
Keycloak
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.