#VU93088 Information disclosure in Keycloak - CVE-2024-4540
Published: June 24, 2024
Keycloak
Keycloak
Description
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to an error in the OAuth 2.0 Pushed Authorization Requests (PAR) implementation. Client provided parameters are included in plain text in to
the KC_RESTART cookie returned by the authorization server's HTTP
response to a request_uri authorization request. A local user with access to the system can use the cookie to gain access to sensitive information.