Description

A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.

INFO

Published Date :

2024-06-03T15:33:18.191Z

Last Modified :

2026-03-26T23:13:49.571Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2024-4540 vulnerability.

Vendors Products
Redhat
  • Build Keycloak
  • Red Hat Single Sign On
  • Rhosemc

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact