Описание
Keycloak secondary factor bypass in step-up authentication
Keycloak does not correctly validate its client step-up authentication. A password-authed attacker could use this flaw to register a false second auth factor, alongside the existing one, to a targeted account. The second factor then permits step-up authentication.
Ссылки
- https://github.com/keycloak/keycloak/security/advisories/GHSA-4f53-xh3v-g8x4
- https://nvd.nist.gov/vuln/detail/CVE-2023-3597
- https://github.com/keycloak/keycloak/commit/aa634aee882892960a526e49982806e103c8a432
- https://access.redhat.com/errata/RHSA-2024:1866
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/security/cve/CVE-2023-3597
- https://bugzilla.redhat.com/show_bug.cgi?id=2221760
Пакеты
org.keycloak:keycloak-services
< 22.0.10
22.0.10
org.keycloak:keycloak-services
>= 23.0.0, < 24.0.3
24.0.3
Связанные уязвимости
A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along with an existing one and bypass authentication.
A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along with an existing one and bypass authentication.
A flaw was found in Keycloak, where it does not correctly validate its ...