Keycloak vulnerability that allows session hijacking during authorization code flow
See https://github.com/advisories/GHSA-9g98-5mj6-f9mv
- Docker
- curl
- jq
- python3 or another tool to serve static files on HTTP
- Start Keycloak container with
./run-keycloak-container.sh
- Create two users
alice
andmallory
with./create-users.sh
- Serve the static files from this repo, e.g.,
python3 -m http.server 8000
- Open http://localhost:8000/index.html in two browser sessions
- Start logging in with
alice
and passwordtest
in session 1 and copy the session id from the prompt - Start logging in with
mallory
and passwordtest
in session 2 and paste the session id fromalice
into the prompt (and press OK) - You should be logged in as
alice
in session 2 frommallory