关联漏洞
Description
A small PoC for the Keycloak vulnerability CVE-2023-0264
介绍
# PoC for CVE-2023-0264
_Keycloak vulnerability that allows session hijacking during authorization code flow_
See https://github.com/advisories/GHSA-9g98-5mj6-f9mv
## Prerequisites
- Docker
- curl
- jq
- python3 or another tool to serve static files on HTTP
## Steps to reproduce
1. Start Keycloak container with `./run-keycloak-container.sh`
2. Create two users `alice` and `mallory` with `./create-users.sh`
3. Serve the static files from this repo, e.g., `python3 -m http.server 8000`
4. Open http://localhost:8000/index.html in **two** browser sessions
5. Start logging in with `alice` and password `test` in session 1 and copy the session id from the prompt
6. Start logging in with `mallory` and password `test` in session 2 and paste the session id from `alice` into the
prompt (and press _OK_)
7. You should be logged in as `alice` in session 2 from `mallory`
文件快照
[4.0K] /data/pocs/656cc520c5a47d82e6fa1f119ba13f86c6810cdb
├── [1.9K] client2.html
├── [1010] create-users.sh
├── [1.9K] index.html
├── [ 92K] keycloak.js
├── [ 876] README.md
├── [4.0K] realm-data
│ └── [ 59K] realm-export.json
└── [ 225] run-keycloak-container.sh
1 directory, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。