High severity7.1NVD Advisory· Published Apr 17, 2024· Updated Apr 15, 2026
CVE-2024-2419
CVE-2024-2419
Description
A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other users. It is very similar to CVE-2023-6291.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-servicesMaven | < 22.0.10 | 22.0.10 |
org.keycloak:keycloak-servicesMaven | >= 23.0.0, < 24.0.3 | 24.0.3 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-mrv8-pqfj-7gp5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-2419ghsaADVISORY
- access.redhat.com/errata/RHSA-2024:1867nvdWEB
- access.redhat.com/security/cve/CVE-2024-2419nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/keycloak/keycloak/security/advisories/GHSA-mrv8-pqfj-7gp5ghsaWEB
News mentions
0No linked articles in our index yet.