CVE-2017-12160 – org.keycloak:keycloak-parent
Package
Manager: maven
Name: org.keycloak:keycloak-parent
Vulnerable Version: >=0 <3.3.0.final
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0046 pctl0.63199
Details
Keycloak Oauth Implementation Error It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
Metadata
Created: 2022-05-13T01:23:16Z
Modified: 2023-10-10T14:39:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qc72-gfvw-76h7/GHSA-qc72-gfvw-76h7.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-qc72-gfvw-76h7
Finding: F039
Auto approve: 1