Miggo Logo

CVE-2023-6787: Keycloak vulnerable to session hijacking via re-authentication

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.61307%
Published
4/17/2024
Updated
3/14/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.keycloak:keycloak-servicesmaven< 22.0.1022.0.10
org.keycloak:keycloak-servicesmaven>= 23.0.0, < 24.0.324.0.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper session management during re-authentication flows. Keycloak's authorization endpoint handles 'prompt=login' requests but doesn't properly reset session identifiers when users cancel re-authentication. AuthenticationManager's cookie handling retains the same SID across sessions when re-auth is interrupted, violating session isolation. These functions directly manage session creation/authentication state and align with the described SID reuse behavior. The CWEs (287/384/613) all point to authentication/session management flaws in these core authentication flow components.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in K*y*lo*k. *n **tiv* k*y*lo*k s*ssion **n ** *ij**k** *y initi*tin* * n*w *ut**nti**tion (**vin* t** qu*ry p*r*m*t*r prompt=lo*in) *n* *or*in* t** us*r to *nt*r *is *r***nti*ls on** ***in. I* t** us*r **n**ls t*is r*-*ut**nti**tion

Reasoning

T** vuln*r**ility st*ms *rom improp*r s*ssion m*n***m*nt *urin* r*-*ut**nti**tion *lows. K*y*lo*k's *ut*oriz*tion *n*point **n*l*s 'prompt=lo*in' r*qu*sts *ut *o*sn't prop*rly r*s*t s*ssion i**nti*i*rs w**n us*rs **n**l r*-*ut**nti**tion. `*ut**nti**