Lucene search

K
githubGitHub Advisory DatabaseGHSA-9G98-5MJ6-F9MV
HistoryMar 02, 2023 - 11:25 p.m.

Keycloak vulnerable to user impersonation via stolen UUID code

2023-03-0223:25:43
CWE-287
CWE-345
GitHub Advisory Database
github.com
123
keycloak
openid connect
user authentication
vulnerability
session tokens

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

28.6%

Keycloak’s OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
CPENameOperatorVersion
org.keycloak:keycloak-serviceslt21.0.1

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

28.6%