First published: Mon May 08 2023(Updated: )
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authed admin into granting consent to a malicious OAuth client, or possible unauthorized access to an existing OAuth client.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:18.0.8-1.redhat_00001.1.el7 | 0:18.0.8-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.8-1.redhat_00001.1.el8 | 0:18.0.8-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.8-1.redhat_00001.1.el9 | 0:18.0.8-1.redhat_00001.1.el9 |
maven/org.keycloak:keycloak-server-spi-private | <21.1.2 | 21.1.2 |
maven/org.keycloak:keycloak-services | <21.1.2 | 21.1.2 |
All of | ||
Redhat Single Sign-on | =7.6 | |
Any of | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
Redhat Openshift Container Platform | =4.11 | |
Redhat Openshift Container Platform | =4.12 | |
Redhat Openshift Container Platform For Ibm Z | =4.9 | |
Redhat Openshift Container Platform For Ibm Z | =4.10 | |
Redhat Openshift Container Platform For Linuxone | =4.9 | |
Redhat Openshift Container Platform For Linuxone | =4.10 | |
Redhat Openshift Container Platform For Power | =4.9 | |
Redhat Openshift Container Platform For Power | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Single Sign-on |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)