Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Remove session code from URL to prevent security vulnerability

Tags:

keycloak

When authenticating from KeyCloak login page it pass session code as a query param. Are there a way to avoid this and pass session code in different manner (ex: as a header param)

POST https://xxx/auth/realms/xxx/login-actions/authenticate?session_code=xxxxxxxxx&execution=xxxxxx&client_id=xxx&tab_id=xxxx HTTP/1.1

like image 536
era Avatar asked Mar 19 '26 08:03

era


1 Answers

There is no way to prevent that other than modifying source code. Why do you think it is security vulnerability? Session code is used for CSRF (cross-site request forgery) protection. The actual session identifier is stored in browser cookies.

like image 129
Vadim Ashikhman Avatar answered Mar 23 '26 15:03

Vadim Ashikhman



Donate For Us

If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!