logo

CVE-2023-0657 org.keycloak:keycloak-services

Package

Manager: maven
Name: org.keycloak:keycloak-services
Vulnerable Version: >=0 <22.0.10 || >=23.0.0 <24.0.3

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00063 pctl0.19755

Details

Keycloak vulnerable to impersonation via logout token exchange Keycloak was found to not properly enforce token types when validating signatures locally. An authenticated attacker could use this flaw to exchange a logout token for an access token and possibly gain access to data outside of enforced permissions.

Metadata

Created: 2024-04-17T18:25:59Z
Modified: 2024-11-18T17:28:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-7fpj-9hr8-28vh/GHSA-7fpj-9hr8-28vh.json
CWE IDs: ["CWE-273", "CWE-284", "CWE-287", "CWE-290", "CWE-347"]
Alternative ID: GHSA-7fpj-9hr8-28vh
Finding: F039
Auto approve: 1