First published: Mon May 08 2023(Updated: )
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authed admin into granting consent to a malicious OAuth client, or possible unauthorized access to an existing OAuth client.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:18.0.8-1.redhat_00001.1.el7 | 0:18.0.8-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.8-1.redhat_00001.1.el8 | 0:18.0.8-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.8-1.redhat_00001.1.el9 | 0:18.0.8-1.redhat_00001.1.el9 |
maven/org.keycloak:keycloak-server-spi-private | <21.1.2 | 21.1.2 |
maven/org.keycloak:keycloak-services | <21.1.2 | 21.1.2 |
All of | ||
Red Hat Single Sign-On | =7.6 | |
Any of | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
Red Hat OpenShift Container Platform | =4.11 | |
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat OpenShift Container Platform for Power | =4.9 | |
Red Hat OpenShift Container Platform for Power | =4.10 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Single Sign-On |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-2585 is considered a significant vulnerability due to its potential for client consent spoofing.
To remediate CVE-2023-2585, update to the specified secure versions of the affected software packages.
CVE-2023-2585 affects multiple versions of rh-sso7-keycloak and several Red Hat OpenShift Container Platform versions.
Exploitation of CVE-2023-2585 could allow attackers to impersonate legitimate clients and manipulate admin consent processes.
System administrators and cybersecurity teams using affected versions of Keycloak should be notified to assess and implement fixes.