First published: Fri Oct 28 2022(Updated: )
A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
Redhat Keycloak | ||
Redhat Single Sign-on | =7.0 | |
redhat/keycloak | <20.0.3 | 20.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-0091 is a vulnerability found in Keycloak where it did not properly check client tokens for possible revocation in its client credential flow.
The severity of CVE-2023-0091 is low with a CVSS score of 3.8.
CVE-2023-0091 affects Keycloak by allowing an attacker to access or modify potentially sensitive information.
Versions 0:18.0.6-1.redhat_00001.1.el7, 0:18.0.6-1.redhat_00001.1.el8, and 0:18.0.6-1.redhat_00001.1.el9 of Keycloak are affected by CVE-2023-0091.
To fix CVE-2023-0091, you need to update Keycloak to a version that includes the necessary fixes, such as 0:18.0.6-1.redhat_00001.1.el7, 0:18.0.6-1.redhat_00001.1.el8, or 0:18.0.6-1.redhat_00001.1.el9.