2024-09-13 12:03:17 +00:00

16 lines
692 B
JSON

{
"id": "CVE-2024-5203",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-12T09:15:20.647",
"lastModified": "2024-09-13T11:15:10.197",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: After careful review of CVE-2024-5203, it has been determined that the issue is not exploitable in real-world scenarios. Moreover, the exploit assumes that the attacker has access to a session code parameter that matches a cookie on the Keycloak server. However the attacker does not have access to the cookie, and can therefore not craft a malicious request."
}
],
"metrics": {},
"references": []
}