支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 656cc520c5a47d82e6fa1f119ba13f86c6810cdb

来源
关联漏洞
标题:keycloak 授权问题漏洞 (CVE-2023-0264)
Description:Red Hat Keycloak是美国红帽(Red Hat)公司的一套为现代应用和服务提供身份验证和管理功能的软件。 keycloak存在安全漏洞。攻击者利用该漏洞通过被盗的uuid代码进行用户模拟。
Description
A small PoC for the Keycloak vulnerability CVE-2023-0264
介绍
# PoC for CVE-2023-0264

_Keycloak vulnerability that allows session hijacking during authorization code flow_

See https://github.com/advisories/GHSA-9g98-5mj6-f9mv

## Prerequisites

- Docker
- curl
- jq
- python3 or another tool to serve static files on HTTP

## Steps to reproduce

1. Start Keycloak container with `./run-keycloak-container.sh`
2. Create two users `alice` and `mallory` with `./create-users.sh`
3. Serve the static files from this repo, e.g., `python3 -m http.server 8000`
4. Open http://localhost:8000/index.html in **two** browser sessions
5. Start logging in with `alice` and password `test` in session 1 and copy the session id from the prompt
6. Start logging in with `mallory` and password `test` in session 2 and paste the session id from `alice` into the
   prompt (and press _OK_)
7. You should be logged in as `alice` in session 2 from `mallory`
文件快照

[4.0K] /data/pocs/656cc520c5a47d82e6fa1f119ba13f86c6810cdb ├── [1.9K] client2.html ├── [1010] create-users.sh ├── [1.9K] index.html ├── [ 92K] keycloak.js ├── [ 876] README.md ├── [4.0K] realm-data │   └── [ 59K] realm-export.json └── [ 225] run-keycloak-container.sh 1 directory, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。