icon

We found results for “

CVE-2022-3916

Good to know:

icon

Date: September 20, 2023

A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Authentication Issues

CWE-287

Insufficient Session Expiration

CWE-613

Session Fixation

CWE-384

Missing Critical Step in Authentication

CWE-304

Exposure of Data Element to Wrong Session

CWE-488

Top Fix

icon

Upgrade Version

Upgrade to version org.keycloak:keycloak-services:20.0.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us