First published: Tue Aug 22 2017(Updated: )
It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Keycloak | <3.3.0. | 3.3.0. |
redhat/Keycloak | <3.4.0. | 3.4.0. |
maven/org.keycloak:keycloak-parent | <3.3.0.Final | 3.3.0.Final |
Redhat Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.