Lucene search

K
osvGoogleOSV:GHSA-9G98-5MJ6-F9MV
HistoryMar 02, 2023 - 11:25 p.m.

Keycloak vulnerable to user impersonation via stolen UUID code

2023-03-0223:25:43
Google
osv.dev
71
keycloak
openid connect
authentication
vulnerability
user impersonation
session tokens

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

28.6%

Keycloak’s OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.

5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

28.6%