First published: Mon May 08 2023(Updated: )
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authed admin into granting consent to a malicious OAuth client, or possible unauthorized access to an existing OAuth client.
Affected Software | Affected Version | How to fix |
---|---|---|
Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2196335 is critical due to the potential for unauthorized access and client spoofing.
To fix REDHAT-BUG-2196335, update your Red Hat Build of Keycloak to the latest patched version provided by Red Hat.
The vulnerability in REDHAT-BUG-2196335 is caused by Keycloak's failure to properly validate the device code and client ID.
Users of Red Hat Build of Keycloak are affected by REDHAT-BUG-2196335, particularly those utilizing device authorization grants.
An attacker exploiting REDHAT-BUG-2196335 could potentially spoof authorization requests and trick administrators into granting consent to malicious OAuth clients.