We found results for “”
CVE-2023-2585
Good to know:
Date: December 21, 2023
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Language: Java
Severity Score
Related Resources (12)
Severity Score
Weakness Type (CWE)
Improperly Implemented Security Check for Standard
CWE-358Top Fix
Upgrade Version
Upgrade to version org.keycloak:keycloak-services:21.1.2;org.keycloak:keycloak-client-registration-cli:21.1.2;org.keycloak:keycloak-admin-cli:21.1.2;org.keycloak:keycloak-server-spi-private:21.1.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | HIGH |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | NONE |