logo

CVE-2023-4918 org.keycloak:keycloak-core

Package

Manager: maven
Name: org.keycloak:keycloak-core
Vulnerable Version: =22.0.2 || >=22.0.2 <22.0.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00081 pctl0.2468

Details

Keycloak vulnerable to Plaintext Storage of User Password A flaw was discovered in Keycloak Core package. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular attributes in the users attributes. The password is also created, but the user attributes must not be there. This way, any entities (all users and clients with proper rights/roles) are able to retrieve the users passwords in clear-text. ### Impact Passwords for self-registered users are stored as cleartext attributes associated with the user. ### Mitigation Disable self-registration for users in all realms until patched.

Metadata

Created: 2023-09-12T21:10:37Z
Modified: 2023-09-12T21:10:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-5q66-v53q-pm35/GHSA-5q66-v53q-pm35.json
CWE IDs: ["CWE-256", "CWE-319"]
Alternative ID: GHSA-5q66-v53q-pm35
Finding: F085
Auto approve: 1