Lucene search

K
nvd[email protected]NVD:CVE-2023-2585
HistoryDec 21, 2023 - 10:15 a.m.

CVE-2023-2585

2023-12-2110:15:34
CWE-358
web.nvd.nist.gov
4
keycloak
device authorization
validation
attacker
client consent
oauth client
unauthorized access

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

38.1%

Keycloak’s device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.

Affected configurations

Nvd
Node
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
AND
redhatsingle_sign-onMatch7.6
Node
redhatenterprise_linuxMatch8.0
AND
redhatopenshift_container_platformMatch4.11
OR
redhatopenshift_container_platformMatch4.12
OR
redhatopenshift_container_platform_for_ibm_zMatch4.9
OR
redhatopenshift_container_platform_for_ibm_zMatch4.10
OR
redhatopenshift_container_platform_for_linuxoneMatch4.9
OR
redhatopenshift_container_platform_for_linuxoneMatch4.10
OR
redhatopenshift_container_platform_for_powerMatch4.9
OR
redhatopenshift_container_platform_for_powerMatch4.10
Node
redhatsingle_sign-onMatch-text-only
VendorProductVersionCPE
redhatenterprise_linux7.0cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhatenterprise_linux9.0cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
redhatsingle_sign-on7.6cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
redhatopenshift_container_platform4.11cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
redhatopenshift_container_platform4.12cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
redhatopenshift_container_platform_for_ibm_z4.9cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*
redhatopenshift_container_platform_for_ibm_z4.10cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*
redhatopenshift_container_platform_for_linuxone4.9cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
redhatopenshift_container_platform_for_linuxone4.10cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

38.1%