Описание
Keycloak vulnerable to impersonation via logout token exchange
Keycloak was found to not properly enforce token types when validating signatures locally. An authenticated attacker could use this flaw to exchange a logout token for an access token and possibly gain access to data outside of enforced permissions.
Ссылки
- https://github.com/keycloak/keycloak/security/advisories/GHSA-7fpj-9hr8-28vh
- https://nvd.nist.gov/vuln/detail/CVE-2023-0657
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/security/cve/CVE-2023-0657
- https://bugzilla.redhat.com/show_bug.cgi?id=2166728
Пакеты
org.keycloak:keycloak-services
< 22.0.10
22.0.10
org.keycloak:keycloak-services
>= 23.0.0, < 24.0.3
24.0.3
EPSS
3.4 Low
CVSS3
CVE ID
Дефекты
Связанные уязвимости
A flaw was found in Keycloak. This issue occurs due to improperly enforcing token types when validating signatures locally. This could allow an authenticated attacker to exchange a logout token for an access token and possibly gain access to data outside of enforced permissions.
A flaw was found in Keycloak. This issue occurs due to improperly enforcing token types when validating signatures locally. This could allow an authenticated attacker to exchange a logout token for an access token and possibly gain access to data outside of enforced permissions.
A flaw was found in Keycloak. This issue occurs due to improperly enfo ...
EPSS
3.4 Low
CVSS3