From e46ff5a05f0abe0baa12b2adc18d1eb6b2caa65c Mon Sep 17 00:00:00 2001 From: Chetven Date: Fri, 20 Dec 2024 14:22:45 +0100 Subject: [PATCH] Adding CVE as alias --- .../2024/10/GHSA-w8gr-xwp4-r9f7/GHSA-w8gr-xwp4-r9f7.json | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2024/10/GHSA-w8gr-xwp4-r9f7/GHSA-w8gr-xwp4-r9f7.json b/advisories/github-reviewed/2024/10/GHSA-w8gr-xwp4-r9f7/GHSA-w8gr-xwp4-r9f7.json index c1649da9e24f0..65f498a8b2852 100644 --- a/advisories/github-reviewed/2024/10/GHSA-w8gr-xwp4-r9f7/GHSA-w8gr-xwp4-r9f7.json +++ b/advisories/github-reviewed/2024/10/GHSA-w8gr-xwp4-r9f7/GHSA-w8gr-xwp4-r9f7.json @@ -3,7 +3,9 @@ "id": "GHSA-w8gr-xwp4-r9f7", "modified": "2024-10-14T20:55:22Z", "published": "2024-10-14T20:55:22Z", - "aliases": [], + "aliases": [ + "CVE-2024-8883" + ], "summary": "Vulnerable Redirect URI Validation Results in Open Redirect", "details": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost/ or http://127.0.0.1/, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", "severity": [ @@ -99,4 +101,4 @@ "github_reviewed_at": "2024-10-14T20:55:22Z", "nvd_published_at": null } -} \ No newline at end of file +}