Rejected reason: After careful review of CVE-2024-5203, it has been determined that the issue is not exploitable in real-world scenarios. Moreover, the exploit assumes that the attacker has access to a session code parameter that matches a cookie on the Keycloak server. However the attacker does not have access to the cookie, and can therefore not craft a malicious request.
CVSS
No CVSS.
References
No reference.
Configurations
No configuration.
History
13 Sep 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
Summary |
|
|
Summary | (en) Rejected reason: After careful review of CVE-2024-5203, it has been determined that the issue is not exploitable in real-world scenarios. Moreover, the exploit assumes that the attacker has access to a session code parameter that matches a cookie on the Keycloak server. However the attacker does not have access to the cookie, and can therefore not craft a malicious request. |
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Jun 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-12 09:15
Updated : 2024-09-13 11:15
NVD link : CVE-2024-5203
Mitre link : CVE-2024-5203
CVE.ORG link : CVE-2024-5203
JSON object : View
Products Affected
No product.
CWE
No CWE.