[keycloak-user] Potential Vulnerability on Login-action endpoint

Hossein Doutaghy hossein.doutaghy at gmail.com
Tue Oct 22 16:11:17 EDT 2019


Hi,

Web security scanner found that Keycloak Admin console is using GET with
login-actions endpoint. It points out that several parameters is visible in
url which can be sensitive. E.g. execution_session_code, client_id.



Scanner recommends not to use GET for sensitive parameters.  Or even better
not accepting GET parameters for the endpoint at all.





Are the parameters for login-actions really sensitive?  What are reason
that this endpoint allows both GET and POST form?


Moe Doutaghy


More information about the keycloak-user mailing list