Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-8883

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-19 Sep, 2024 | 15:48
Updated At-01 Apr, 2026 | 13:27
Rejected At-
Credits

Keycloak: vulnerable redirect uri validation results in open redirec

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:19 Sep, 2024 | 15:48
Updated At:01 Apr, 2026 | 13:27
Rejected At:
â–¼CVE Numbering Authority (CNA)
Keycloak: vulnerable redirect uri validation results in open redirec

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

Affected Products
Collection URL
https://github.com/keycloak/keycloak
Package Name
keycloak-services
Default Status
unaffected
Versions
Affected
  • From 0 before 22.0.12 (semver)
  • From 23.0.0 before 24.0.7 (semver)
  • From 25.0.0 before 25.0.5 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Build of Keycloak
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.keycloak/keycloak-services
CPEs
  • cpe:/a:redhat:build_keycloak:22
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Build of Keycloak
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.keycloak/keycloak-services
CPEs
  • cpe:/a:redhat:build_keycloak:24
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat build of Keycloak 22
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhbk/keycloak-operator-bundle
CPEs
  • cpe:/a:redhat:build_keycloak:22::el9
Default Status
affected
Versions
Unaffected
  • From 22.0.13-1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat build of Keycloak 22
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhbk/keycloak-rhel9
CPEs
  • cpe:/a:redhat:build_keycloak:22::el9
Default Status
affected
Versions
Unaffected
  • From 22-18 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat build of Keycloak 22
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhbk/keycloak-rhel9-operator
CPEs
  • cpe:/a:redhat:build_keycloak:22::el9
Default Status
affected
Versions
Unaffected
  • From 22-21 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat build of Keycloak 24
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhbk/keycloak-operator-bundle
CPEs
  • cpe:/a:redhat:build_keycloak:24::el9
Default Status
affected
Versions
Unaffected
  • From 24.0.8-1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat build of Keycloak 24
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhbk/keycloak-rhel9
CPEs
  • cpe:/a:redhat:build_keycloak:24::el9
Default Status
affected
Versions
Unaffected
  • From 24-17 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat build of Keycloak 24
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhbk/keycloak-rhel9-operator
CPEs
  • cpe:/a:redhat:build_keycloak:24::el9
Default Status
affected
Versions
Unaffected
  • From 24-17 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.keycloak/keycloak-services
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.keycloak/keycloak-services
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:800.4.1-1.GA_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.4-3.GA_redhat_00007.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.33.0-1.redhat_00015.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-activemq-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 1:2.0.0-2.redhat_00005.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-aesh-extensions
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-aesh-readline
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.2.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-codec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.16.1-2.redhat_00007.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-collections
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.2.2-28.redhat_2.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-io
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.15.1-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-lang
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.14.0-2.redhat_00006.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.5-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 1:2.0.0-2.redhat_00005.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-1.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-asyncutil
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:0.1.0-2.redhat_00010.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-aws-java-sdk
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.12.284-2.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-cryptacular
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.2.5-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:800.4.0-1.GA_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-fastinfoset
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-4.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.2.31-1.Final_redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.1-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hppc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:0.8.1-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-insights-java-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.3-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-jstl-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.1-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-cert-helper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.3-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logging
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.5.3-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jctools
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.2-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jgroups
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.3.10-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-log4j
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.22.1-1.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-narayana
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.0.3-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-nimbus-jose-jwt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:9.37.3-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-objectweb-asm
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:9.6.0-1.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-pem-keystore
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-resteasy-extensions
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-resteasy-spring
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-saaj-impl
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-shibboleth-java-support
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-6.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.16-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-snakeyaml
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.2.0-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.4-2.GA_redhat_00005.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:800.4.1-1.GA_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.4-3.GA_redhat_00007.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.33.0-1.redhat_00015.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-activemq-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 1:2.0.0-2.redhat_00005.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-aesh-extensions
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-aesh-readline
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.2.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-codec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.16.1-2.redhat_00007.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-collections
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.2.2-28.redhat_2.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-io
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.15.1-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-commons-lang
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.14.0-2.redhat_00006.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.5-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 1:2.0.0-2.redhat_00005.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-1.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-asyncutil
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:0.1.0-2.redhat_00010.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-aws-java-sdk
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.12.284-2.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-cryptacular
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.2.5-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:800.4.0-1.GA_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-fastinfoset
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-4.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.2.31-1.Final_redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.1-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hppc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:0.8.1-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-insights-java-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.3-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-jstl-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.1-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-cert-helper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.3-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logging
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.5.3-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jctools
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.2-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jgroups
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.3.10-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-log4j
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.22.1-1.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-narayana
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.0.3-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-nimbus-jose-jwt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:9.37.3-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-objectweb-asm
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:9.6.0-1.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-pem-keystore
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-resteasy-extensions
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-resteasy-spring
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-saaj-impl
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-shibboleth-java-support
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-6.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.16-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-snakeyaml
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.2.0-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.4-2.GA_redhat_00005.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.keycloak/keycloak-services
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
Default Status
affected
Versions
Unaffected
  • From 0:18.0.18-1.redhat_00001.1.el7sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
Default Status
affected
Versions
Unaffected
  • From 0:18.0.18-1.redhat_00001.1.el8sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
Default Status
affected
Versions
Unaffected
  • From 0:18.0.18-1.redhat_00001.1.el9sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHEL-8 based Middleware Containers
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rh-sso-7/sso76-openshift-rhel8
CPEs
  • cpe:/a:redhat:rhosemc:1.0::el8
Default Status
affected
Versions
Unaffected
  • From 7.6-54 before * (rpm)
Problem Types
TypeCWE IDDescription
CWECWE-601URL Redirection to Untrusted Site ('Open Redirect')
Type: CWE
CWE ID: CWE-601
Description: URL Redirection to Untrusted Site ('Open Redirect')
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Exploits

Credits

Red Hat would like to thank Karsten Meyer zu Selhausen and Niklas Conrad for reporting this issue.
Timeline
EventDate
Reported to Red Hat.2024-09-16 06:17:01
Made public.2024-09-19 15:13:00
Event: Reported to Red Hat.
Date: 2024-09-16 06:17:01
Event: Made public.
Date: 2024-09-19 15:13:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2024:10385
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:10386
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6878
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6879
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6880
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6882
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6886
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6887
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6888
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6889
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:6890
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:8823
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:8824
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:8826
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-8883
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2312511
issue-tracking
x_refsource_REDHAT
https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:10385
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:10386
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6878
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6879
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6880
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6882
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6886
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6887
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6888
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6889
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6890
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8823
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8824
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8826
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-8883
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2312511
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink: https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:19 Sep, 2024 | 16:15
Updated At:26 Nov, 2024 | 19:15

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

Red Hat, Inc.
redhat
>>build_of_keycloak>>-
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.11
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.12
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_ibm_z>>4.9
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_ibm_z>>4.10
cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_linuxone>>4.9
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_linuxone>>4.10
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_power>>4.9
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform_for_power>>4.10
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>single_sign-on>>-
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
Red Hat, Inc.
redhat
>>single_sign-on>>7.6
cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-601Secondarysecalert@redhat.com
CWE ID: CWE-601
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2024:10385secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:10386secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:6878secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6879secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6880secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6882secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6886secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6887secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6888secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6889secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:6890secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8823secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:8824secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:8826secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2024-8883secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2312511secalert@redhat.com
Issue Tracking
Vendor Advisory
https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.javasecalert@redhat.com
Product
Hyperlink: https://access.redhat.com/errata/RHSA-2024:10385
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:10386
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6878
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6879
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6880
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6882
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6886
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6887
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6888
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6889
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:6890
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8823
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8824
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8826
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-8883
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2312511
Source: secalert@redhat.com
Resource:
Issue Tracking
Vendor Advisory
Hyperlink: https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Source: secalert@redhat.com
Resource:
Product

Change History

0
Information is not available yet

Similar CVEs

836Records found

CVE-2023-4958
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.32%
||
7 Day CHG~0.00%
Published-12 Dec, 2023 | 10:02
Updated-02 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stackrox: missing http security headers allows for clickjacking in web ui

In Red Hat Advanced Cluster Security (RHACS), it was found that some security related HTTP headers were missing, allowing an attacker to exploit this with a clickjacking attack. An attacker could exploit this by convincing a valid RHACS user to visit an attacker-controlled web page, that deceptively points to valid RHACS endpoints, hijacking the user's account permissions to perform other actions.

Action-Not Available
Vendor-Red Hat, Inc.
Product-advanced_cluster_securityRed Hat Advanced Cluster Security 4.2Red Hat Advanced Cluster Security 3
CWE ID-CWE-1021
Improper Restriction of Rendered UI Layers or Frames
CVE-2020-10748
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.35% / 57.79%
||
7 Day CHG~0.00%
Published-16 Sep, 2020 | 17:56
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-single_sign-onkeycloakkeycloak
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-10688
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.22% / 44.88%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 18:45
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-openshift_application_runtimesresteasyenterprise_linuxjboss_enterprise_application_platformfuseRESTEasy
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-9741
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-3.34% / 87.32%
||
7 Day CHG~0.00%
Published-13 Mar, 2019 | 06:00
Updated-04 Aug, 2024 | 22:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectGoRed Hat, Inc.
Product-debian_linuxdeveloper_toolsfedoraenterprise_linuxgon/a
CWE ID-CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
CVE-2019-8331
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.67% / 82.14%
||
7 Day CHG~0.00%
Published-20 Feb, 2019 | 16:00
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.

Action-Not Available
Vendor-getbootstrapn/aRed Hat, Inc.Tenable, Inc.F5, Inc.
Product-big-ip_webacceleratorbig-ip_application_acceleration_managerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_servicebig-ip_global_traffic_managerbig-ip_analyticsbig-ip_local_traffic_managerbig-ip_domain_name_systemtenable.scbig-ip_application_security_managerbig-ip_edge_gatewaybig-ip_link_controllervirtualization_managerbootstrapbig-ip_access_policy_managerbig-ip_advanced_firewall_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-18635
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-8.31% / 92.27%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 22:59
Updated-05 Aug, 2024 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.

Action-Not Available
Vendor-novncn/aCanonical Ltd.Red Hat, Inc.Debian GNU/Linux
Product-ubuntu_linuxopenstackdebian_linuxnovncn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-15100
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.34% / 56.98%
||
7 Day CHG~0.00%
Published-27 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An attacker submitting facts to the Foreman server containing HTML can cause a stored XSS on certain pages: (1) Facts page, when clicking on the "chart" button and hovering over the chart; (2) Trends page, when checking the graph for a trend based on a such fact; (3) Statistics page, for facts that are aggregated on this page.

Action-Not Available
Vendor-Red Hat, Inc.The Foreman
Product-foremansatellite_capsulesatelliteForeman
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2010-3857
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.41% / 61.50%
||
7 Day CHG~0.00%
Published-12 Nov, 2019 | 22:03
Updated-07 Aug, 2024 | 03:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss BRMS before 5.1.0 has a XSS vulnerability via asset=UUID parameter.

Action-Not Available
Vendor-JBoss BRMSRed Hat, Inc.
Product-jboss_business_rules_management_systemJBoss BRMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1000007
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.33%
||
7 Day CHG~0.00%
Published-07 Oct, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pagure 2.2.1 XSS in raw file endpoint

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-paguren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1000037
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.41% / 61.67%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 18:27
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pagure: XSS possible in file attachment endpoint

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-pagurefedoraenterprise_linuxn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1000229
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-4.98% / 89.71%
||
7 Day CHG~0.00%
Published-20 Dec, 2019 | 13:02
Updated-06 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

swagger-ui has XSS in key names

Action-Not Available
Vendor-smartbearn/aRed Hat, Inc.
Product-swagger-uijboss_fuseopenshiftn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-11358
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.65% / 85.76%
||
7 Day CHG+0.79%
Published-19 Apr, 2019 | 00:00
Updated-15 Nov, 2024 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

Action-Not Available
Vendor-backdropcmsn/ajQuery (OpenJS Foundation)The Drupal AssociationRed Hat, Inc.Juniper Networks, Inc.Joomla!openSUSEOracle CorporationNetApp, Inc.Fedora ProjectDebian GNU/Linux
Product-communications_diameter_signaling_routerpeoplesoft_enterprise_peopletoolsprimavera_unifierjdeveloper_and_adffinancial_services_data_foundationtape_library_acslsretail_back_officediagnostic_assistantinsurance_allocation_manager_for_enterprise_profitabilityfinancial_services_hedge_management_and_ifrs_valuationscommunications_session_route_managerfinancial_services_regulatory_reporting_for_de_nederlandsche_bankhospitality_simphonybackdropbi_publisherfinancial_services_retail_customer_analyticsapplication_service_level_managementfinancial_services_loan_loss_forecasting_and_provisioningsnapcenterpolicy_automation_for_mobile_devicescommunications_application_session_controllerservice_busvirtualization_managerjqueryfedoraoncommand_system_managerfinancial_services_profitability_managementsiebel_mobile_applicationsfusion_middleware_mapviewerjunoscommunications_unified_inventory_managementwebcenter_sitesleapbusiness_process_management_suitefinancial_services_liquidity_risk_measurement_and_managementcommunications_operations_monitorinsurance_ifrs_17_analyzerbanking_digital_experienceretail_customer_insightshealthcare_translational_researchfinancial_services_asset_liability_managementinsurance_accounting_analyzerfinancial_services_enterprise_financial_performance_analyticsretail_returns_managementbackports_slefinancial_services_regulatory_reporting_for_us_federal_reservefinancial_services_revenue_management_and_billingpolicy_automation_connector_for_siebelfinancial_services_retail_performance_analyticsdebian_linuxweblogic_serverfinancial_services_liquidity_risk_managementreal-time_schedulerinsurance_data_foundationhospitality_guest_accessfinancial_services_market_risk_measurement_and_managementidentity_managercommunications_element_managerretail_central_officeprimavera_gatewayutilities_mobile_workforce_managementpolicy_automationbanking_platformcommunications_session_report_managerfinancial_services_price_creation_and_discoveryretail_point-of-serviceinsurance_performance_insighthealthcare_foundationbanking_enterprise_collectionsfinancial_services_analytical_applications_infrastructurefinancial_services_balance_sheet_planningcloudformstransportation_managementdrupalbig_data_discoverycommunications_interactive_session_recorderenterprise_manager_ops_centerapplication_testing_suitecommunications_services_gatekeeperfinancial_services_basel_regulatory_capital_internal_ratings_based_approachfinancial_services_data_governance_for_us_regulatory_reportinginsurance_insbridge_rating_and_underwritingretail_customer_management_and_segmentation_foundationapplication_expressagile_product_lifecycle_management_for_processfinancial_services_basel_regulatory_capital_basicrest_data_servicescommunications_billing_and_revenue_managementsiebel_ui_frameworkfinancial_services_regulatory_reporting_for_european_banking_authorityhospitality_materials_controlfinancial_services_institutional_performance_analyticsknowledgeenterprise_session_border_controllerstoragetek_tape_analytics_sw_toolcommunications_webrtc_session_controllerfinancial_services_data_integration_hubjoomla\!communications_eagle_application_processorjdevelopersystem_utilitiescommunications_analyticsfinancial_services_analytical_applications_reconciliation_frameworkjd_edwards_enterpriseone_toolsfinancial_services_funds_transfer_pricingn/a
CWE ID-CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2023-1932
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.85% / 74.87%
||
7 Day CHG~0.00%
Published-07 Nov, 2024 | 10:00
Updated-08 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hibernate-validator: rendering of invalid html with safehtml leads to html injection and xss

A flaw was found in hibernate-validator's 'isValid' method in the org.hibernate.validator.internal.constraintvalidators.hv.SafeHtmlValidator class, which can be bypassed by omitting the tag ending in a less-than character. Browsers may render an invalid html, allowing HTML injection or Cross-Site-Scripting (XSS) attacks.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss SOA Platform 5Red Hat AMQ Broker 7A-MQ Clients 2Red Hat JBoss BRMS 5Red Hat support for Spring BootRed Hat Process Automation 7Red Hat A-MQ OnlineRed Hat BPM Suite 6Red Hat Data Grid 8Red Hat JBoss Data Grid 7Red Hat Fuse 7streams for Apache KafkaRed Hat JBoss Fuse Service Works 6Red Hat JBoss Data Virtualization 6Red Hat JBoss Enterprise Application Platform Continuous DeliveryRed Hat JBoss Enterprise Application Platform 7Red Hat OpenStack Platform 10 (Newton)Red Hat Decision Manager 7Red Hat CodeReady Studio 12Red Hat JBoss Fuse 6Red Hat JBoss Operations Network 3Red Hat OpenStack Platform 13 (Queens)Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 5Red Hat JBoss Enterprise Application Platform 6Red Hat Satellite 6Cryostat 2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-9090
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 45.98%
||
7 Day CHG~0.00%
Published-24 Sep, 2019 | 13:38
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CoreOS Tectonic 1.7.x and 1.8.x before 1.8.7-tectonic.2 deploys the Grafana web application using default credentials (admin/admin) for the administrator account located at grafana-credentials secret. This occurs because CoreOS does not randomize the administrative password to later be configured by Tectonic administrators. An attacker can insert an XSS payload into the dashboards.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-tectonicn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-3914
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.48% / 65.12%
||
7 Day CHG~0.00%
Published-25 Aug, 2022 | 19:36
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that the smallrye health metrics UI component did not properly sanitize some user inputs. An attacker could use this flaw to conduct cross-site scripting attacks.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-smallrye_healthopenshift_application_runtimesbuild_of_quarkussmallrye-health
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-14862
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.23% / 46.17%
||
7 Day CHG~0.00%
Published-02 Jan, 2020 | 14:18
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.

Action-Not Available
Vendor-knockoutjsOracle CorporationRed Hat, Inc.
Product-knockoutprocess_automationbusiness_intelligencegoldengatedecision_managerknockout
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-0183
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.29% / 52.52%
||
7 Day CHG~0.00%
Published-02 Jan, 2020 | 19:20
Updated-06 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of Katello as shipped with Red Hat Subscription Asset Manager 1.4 are vulnerable to a XSS via HTML in the systems name when registering.

Action-Not Available
Vendor-KatelloRed Hat, Inc.
Product-subscription_asset_managerKatello
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-3592
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.29% / 52.09%
||
7 Day CHG~0.00%
Published-13 Nov, 2019 | 15:33
Updated-06 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenShift Origin: Improperly validated team names could allow stored XSS attacks

Action-Not Available
Vendor-OpenShift OriginRed Hat, Inc.
Product-openshift_originOpenShift Origin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-3656
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.29% / 52.09%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 13:04
Updated-06 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss KeyCloak: XSS in login-status-iframe.html

Action-Not Available
Vendor-JBoss KeyCloakRed Hat, Inc.
Product-jboss_keycloakJBoss KeyCloak
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-3649
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.29% / 52.09%
||
7 Day CHG~0.00%
Published-04 Nov, 2019 | 14:02
Updated-06 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss AeroGear has reflected XSS via the password field

Action-Not Available
Vendor-JBossRed Hat, Inc.
Product-jboss_aerogearAeroGear
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-1530
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.86% / 75.15%
||
7 Day CHG~0.00%
Published-30 Apr, 2014 | 10:00
Updated-25 Nov, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.

Action-Not Available
Vendor-n/aMozilla CorporationCanonical Ltd.SUSEFedora ProjectopenSUSEDebian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_eusthunderbirdenterprise_linux_server_tussuse_linux_enterprise_serverfedorafirefoxubuntu_linuxenterprise_linux_desktopenterprise_linux_serverseamonkeydebian_linuxenterprise_linux_server_eusopensuseenterprise_linux_workstationenterprise_linux_server_ausn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-7370
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-1.08% / 77.89%
||
7 Day CHG~0.00%
Published-11 Dec, 2019 | 13:55
Updated-06 Aug, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

node-connect before 2.8.1 has XSS in the Sencha Labs Connect middleware

Action-Not Available
Vendor-senchan/aDebian GNU/LinuxRed Hat, Inc.openSUSE
Product-opensuseopenshiftdebian_linuxconnectn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-3872
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.3||HIGH
EPSS-0.03% / 9.28%
||
7 Day CHG-0.00%
Published-02 Apr, 2026 | 12:37
Updated-16 Apr, 2026 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: keycloak: information disclosure due to redirect_uri validation bypass

A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure.

Action-Not Available
Vendor-Red Hat, Inc.
Product-build_of_keycloakRed Hat build of Keycloak 26.2.15Red Hat build of Keycloak 26.4Red Hat build of Keycloak 26.4.11Red Hat build of Keycloak 26.2
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2016-5385
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-81.35% / 99.17%
||
7 Day CHG~0.00%
Published-19 Jul, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.The Drupal AssociationFedora ProjectThe PHP GroupDebian GNU/LinuxOracle CorporationHP Inc.
Product-phpstoreever_msl6480_tape_libraryenterprise_linux_serversystem_management_homepagefedoraenterprise_manager_ops_centerleapenterprise_linux_desktopdrupalenterprise_linux_workstationstoreever_msl6480_tape_library_firmwaredebian_linuxlinuxcommunications_user_data_repositoryn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-14658
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 47.12%
||
7 Day CHG~0.00%
Published-13 Nov, 2018 | 19:00
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in JBOSS Keycloak 3.2.1.Final. The Redirect URL for both Login and Logout are not normalized in org.keycloak.protocol.oidc.utils.RedirectUtils before the redirect url is verified. This can lead to an Open Redirection attack

Action-Not Available
Vendor-Red Hat, Inc.
Product-keycloakkeycloak
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2018-11784
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-4.3||MEDIUM
EPSS-82.62% / 99.24%
||
7 Day CHG~0.00%
Published-04 Oct, 2018 | 13:00
Updated-16 Sep, 2024 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Action-Not Available
Vendor-Canonical Ltd.The Apache Software FoundationRed Hat, Inc.NetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-enterprise_linux_serverubuntu_linuxcommunications_application_session_controllerdebian_linuxenterprise_linux_server_eusretail_order_brokerenterprise_linux_server_ausenterprise_linux_workstationinstantis_enterprisetracksecure_global_desktophospitality_guest_accesssnap_creator_frameworktomcatenterprise_linux_server_tusenterprise_linux_desktopApache Tomcat
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2017-8989
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.1||CRITICAL
EPSS-0.64% / 70.61%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability in HPE IceWall SSO Dfw 10.0 and 11.0 on RHEL, HP-UX, and Windows could be exploited remotely to allow URL Redirection.

Action-Not Available
Vendor-Microsoft CorporationHewlett Packard Enterprise (HPE)HP Inc.Red Hat, Inc.
Product-icewall_ssoenterprise_linuxwindowshp-uxHPE Icewall DFW
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2026-2376
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.03% / 9.10%
||
7 Day CHG~0.00%
Published-12 Mar, 2026 | 19:11
Updated-12 Mar, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mirror-registry: quay: quay: server-side request forgery via open redirect vulnerability in web interface

A flaw was found in mirror-registry where an authenticated user can trick the system into accessing unintended internal or restricted systems by providing malicious web addresses. When the application processes these addresses, it automatically follows redirects without verifying the final destination, allowing attackers to route requests to systems they should not have access to.

Action-Not Available
Vendor-Red Hat, Inc.
Product-mirror registry for Red Hat OpenShiftmirror registry for Red Hat OpenShift 2Red Hat Quay 3
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-7777
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 10.90%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 11:38
Updated-27 Feb, 2026 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mirror-registry: host header injection in mirror-registry

The mirror-registry doesn't properly sanitize the host header HTTP header in HTTP request received, allowing an attacker to perform malicious redirects to attacker-controlled domains or phishing campaigns.

Action-Not Available
Vendor-Red Hat, Inc.
Product-mirror registry for Red Hat OpenShift
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2017-3085
Matching Score-6
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-6
Assigner-Adobe Systems Incorporated
CVSS Score-7.4||HIGH
EPSS-0.81% / 74.33%
||
7 Day CHG~0.00%
Published-11 Aug, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect.

Action-Not Available
Vendor-Linux Kernel Organization, IncRed Hat, Inc.Apple Inc.Adobe Inc.Microsoft CorporationGoogle LLC
Product-enterprise_linux_desktopchrome_osenterprise_linux_workstationlinux_kernelflash_player_desktop_runtimewindows_8.1windowsenterprise_linuxwindows_10flash_playermac_os_xFlash Player
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-3877
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.81% / 74.29%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 12:19
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.

Action-Not Available
Vendor-mod_auth_mellon_projectuninettCanonical Ltd.Red Hat, Inc.Fedora Project
Product-ubuntu_linuxfedoramod_auth_mellonenterprise_linuxmod_auth_mellon
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-3155
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.67% / 71.35%
||
7 Day CHG~0.00%
Published-03 Apr, 2025 | 13:34
Updated-11 Nov, 2025 | 12:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Yelp: arbitrary file read

A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.

Action-Not Available
Vendor-Red Hat, Inc.Debian GNU/LinuxThe GNOME Project
Product-enterprise_linux_for_ibm_z_systems_eusdebian_linuxcodeready_linux_builder_for_power_little_endian_euscodeready_linux_builderenterprise_linux_server_tusenterprise_linux_server_ausenterprise_linux_update_services_for_sap_solutionscodeready_linux_builder_for_arm64codeready_linux_builder_for_power_little_endianyelpcodeready_linux_builder_for_ibm_z_systems_euscodeready_linux_builder_for_eusenterprise_linux_for_power_little_endian_euscodeready_linux_builder_for_arm64_eusenterprise_linux_for_arm_64codeready_linux_builder_for_ibm_z_systemsenterprise_linux_for_ibm_z_systemsenterprise_linux_for_power_little_endianenterprise_linuxenterprise_linux_for_arm_64_eusenterprise_linux_eusRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 6Red Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 8Red Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-2419
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.07% / 21.16%
||
7 Day CHG~0.00%
Published-17 Apr, 2024 | 13:23
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: path traversal in the redirect validation

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other users. It is very similar to CVE-2023-6291.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat build of Keycloak 22
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2011-1594
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.40% / 60.65%
||
7 Day CHG~0.00%
Published-05 Feb, 2014 | 18:00
Updated-02 Apr, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Spacewalk: spacewalk: open redirect vulnerability enables phishing attacks via url parameter

A flaw was found in Spacewalk, as used in Red Hat Network Satellite. This open redirect vulnerability allows remote attackers to redirect users to arbitrary web sites by manipulating a URL in the url_bounce parameter. This can enable attackers to conduct phishing attacks, potentially leading to unauthorized information disclosure or credential theft.

Action-Not Available
Vendor-Red Hat, Inc.
Product-spacewalknetwork_satelliteRed Hat Enterprise Linux 7Red Hat Enterprise Linux 6
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2023-6291
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.18% / 39.71%
||
7 Day CHG~0.00%
Published-26 Jan, 2024 | 14:23
Updated-11 Nov, 2025 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: redirect_uri validation bypass

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.

Action-Not Available
Vendor-Red Hat, Inc.
Product-single_sign-onopenshift_container_platform_for_ibm_zmigration_toolkit_for_applicationsopenshift_container_platformkeycloakenterprise_linuxopenshift_container_platform_for_poweropenshift_container_platform_for_linuxoneRed Hat build of Keycloak 22.0.7Red Hat Data Grid 8Red Hat Single Sign-On 7Migration Toolkit for Applications 7Migration Toolkit for Applications 6Red Hat JBoss Enterprise Application Platform 6Red Hat Fuse 7Red Hat Single Sign-On 7.6 for RHEL 9Red Hat Single Sign-On 7.6 for RHEL 7Red Hat build of Keycloak 22Red Hat Process Automation 7Single Sign-On 7.6.6Red Hat JBoss Data Grid 7RHEL-8 based Middleware ContainersRed Hat Decision Manager 7OpenShift ServerlessRed Hat Single Sign-On 7.6 for RHEL 8
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2020-10775
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.41% / 61.37%
||
7 Day CHG~0.00%
Published-24 Aug, 2020 | 16:13
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Open redirect vulnerability was found in ovirt-engine versions 4.4 and earlier, where it allows remote attackers to redirect users to arbitrary web sites and attempt phishing attacks. Once the target has opened the malicious URL in their browser, the critical part of the URL is no longer visible. The highest threat from this vulnerability is on confidentiality.

Action-Not Available
Vendor-n/aOracle CorporationRed Hat, Inc.
Product-ovirt-enginevirtualizationovirt-engine
CWE ID-CWE-451
User Interface (UI) Misrepresentation of Critical Information
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2017-15419
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.71% / 72.26%
||
7 Day CHG~0.00%
Published-28 Aug, 2018 | 19:00
Updated-05 Aug, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to infer browsing history by triggering a leaked cross-origin URL via a crafted HTML page.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationenterprise_linux_desktopGoogle Chrome prior to 63.0.3239.84 unknown
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-1954
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 47.44%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:30
Updated-21 Nov, 2024 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Server Open Redirection Vulnerability

A vulnerability in the web-based management interface of Cisco Webex Meetings Server Software could allow an unauthenticated, remote attacker to redirect a user to an undesired web page. The vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected device. An attacker could exploit this vulnerability by crafting an HTTP request that could cause the web application to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious website.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetings_serverCisco WebEx Meetings Server
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-20
Improper Input Validation
CVE-2019-19709
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.32% / 54.63%
||
7 Day CHG~0.00%
Published-11 Dec, 2019 | 01:33
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page.

Action-Not Available
Vendor-n/aDebian GNU/LinuxWikimedia Foundation
Product-debian_linuxmediawikin/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-19484
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 19.60%
||
7 Day CHG~0.00%
Published-20 Mar, 2020 | 02:37
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect via parameter ‘p’ in login.php in Centreon (19.04.4 and below) allows an attacker to craft a payload and execute unintended behavior.

Action-Not Available
Vendor-n/aCENTREON
Product-centreonn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-18781
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 57.88%
||
7 Day CHG-0.02%
Published-18 Dec, 2019 | 21:02
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An open redirect vulnerability was discovered in Zoho ManageEngine ADSelfService Plus 5.x before 5809 that allows attackers to force users who click on a crafted link to be sent to a specified external site.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_adselfservice_plusn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-19703
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.00% / 0.14%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 19:43
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.

Action-Not Available
Vendor-n/aJetBrains s.r.o.
Product-ktorn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-19775
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.27% / 50.60%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 03:27
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The image thumbnailing handler in Zulip Server versions 1.9.0 to before 2.0.8 allowed an open redirect that was visible to logged-in users.

Action-Not Available
Vendor-n/aKandra Labs, Inc. (Zulip)
Product-zulip_servern/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-19758
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.42% / 61.82%
||
7 Day CHG~0.00%
Published-14 Feb, 2020 | 17:10
Updated-16 Sep, 2024 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web interface of Lenovo EZ Media & Backup Center, ix2 & ix2-dl version 4.1.406.34763 and prior could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page.

Action-Not Available
Vendor-Lenovo Group Limited
Product-ez_media_\&_backup_center_ix2ez_media_\&_backup_center_ix2-dl_firmwareez_media_\&_backup_center_ix2_firmwareez_media_\&_backup_center_ix2-dlEZ Media & Backup Center ix2EZ Media & Backup Center ix2-dl
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2023-0042
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.18% / 39.61%
||
7 Day CHG~0.00%
Published-12 Jan, 2023 | 00:00
Updated-08 Apr, 2025 | 13:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.4 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2. GitLab Pages allows redirection to arbitrary protocols.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-18451
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 27.59%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 16:43
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GitLab Community and Enterprise Edition 10.7.4 through 12.4 in the InternalRedirect filtering feature. It has an Open Redirect.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-3027
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-5.1||MEDIUM
EPSS-0.16% / 37.27%
||
7 Day CHG~0.00%
Published-31 Mar, 2025 | 10:31
Updated-09 Oct, 2025 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Redirect vulnerability in EJBCA

The vulnerability exists in the EJBCA service, version 8.0 Enterprise. By making a small change to the PATH of the URL associated with the service, the server fails to find the requested file and redirects to an external page. This vulnerability could allow users to be redirected to potentially malicious external sites, which can be exploited for phishing or other social engineering attacks.

Action-Not Available
Vendor-primekeyPrimeKey Solutions AB
Product-ejbcaEJBCA
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-15974
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.25% / 48.21%
||
7 Day CHG~0.00%
Published-23 Sep, 2020 | 00:27
Updated-13 Nov, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Managed Services Accelerator Open Redirect Vulnerability

A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-managed_services_acceleratorCisco Managed Services Accelerator
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-20
Improper Input Validation
CVE-2019-16220
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.82% / 74.44%
||
7 Day CHG~0.00%
Published-11 Sep, 2019 | 13:06
Updated-21 Aug, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In WordPress before 5.2.3, validation and sanitization of a URL in wp_validate_redirect in wp-includes/pluggable.php could lead to an open redirect if a provided URL path does not start with a forward slash.

Action-Not Available
Vendor-n/aDebian GNU/LinuxWordPress.org
Product-wordpressdebian_linuxn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-30164
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.1||MEDIUM
EPSS-0.08% / 23.38%
||
7 Day CHG~0.00%
Published-26 Mar, 2025 | 16:13
Updated-01 Aug, 2025 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Icinga Web 2 has open redirect on login page

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 vulnerability allows an attacker to craft a URL that, once visited by an authenticated user (or one that is able to authenticate), allows to manipulate the backend to redirect the user to any location. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. No known workarounds are available.

Action-Not Available
Vendor-icingaIcinga
Product-icinga_web_2icingaweb2
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 16
  • 17
  • Next
Details not found