Lucene search

K
nvd[email protected]NVD:CVE-2023-0264
HistoryAug 04, 2023 - 6:15 p.m.

CVE-2023-0264

2023-08-0418:15:11
CWE-287
web.nvd.nist.gov
2
keycloak
openid connect
user authentication
unauthorized access
confidentiality
integrity
availability

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

4.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.

Affected configurations

NVD
Node
redhatkeycloakRange<18.0.6
Node
redhatsingle_sign-onRange<7.6.2
AND
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
Node
redhatopenshift_container_platformMatch4.9
OR
redhatopenshift_container_platformMatch4.10
OR
redhatopenshift_container_platform_for_ibm_linuxoneMatch4.9
OR
redhatopenshift_container_platform_for_ibm_linuxoneMatch4.10
OR
redhatopenshift_container_platform_ibm_z_systemsMatch4.9
OR
redhatopenshift_container_platform_ibm_z_systemsMatch4.10
OR
redhatsingle_sign-onRange<7.6.2
AND
redhatenterprise_linuxMatch8.0
Node
redhatsingle_sign-onMatch-text-only

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

4.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%