First published: Tue Sep 12 2023(Updated: )
A flaw was discovered in Keycloak Core package. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular attributes in the users attributes. The password is also created, but the user attributes must not be there. This way, any entities (all users and clients with proper rights/roles) are able to retrieve the users passwords in clear-text. ### Impact Passwords for self-registered users are stored as cleartext attributes associated with the user. ### Mitigation Disable self-registration for users in all realms until patched.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | =22.0.2 | |
redhat/keycloak | <22.0.3 | 22.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4918 is a vulnerability found in the Keycloak Core package, specifically in org.keycloak.userprofile.
CVE-2023-4918 has a severity level of 8.8 (high).
CVE-2023-4918 allows user attributes to contain the 'password' and 'password-confirm' fields, which can lead to unauthorized access.
To fix CVE-2023-4918, update to Keycloak version 22.0.3 or higher.
You can find more information about CVE-2023-4918 in the following references: [1] [2] [3].