Lucene search

K
githubGitHub Advisory DatabaseGHSA-3QH5-QQJ2-C78F
HistoryJun 30, 2023 - 8:31 p.m.

Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients

2023-06-3020:31:37
CWE-295
GitHub Advisory Database
github.com
29
keycloak
mtls
oauth
openid
authentication
vulnerability

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

0.001 Low

EPSS

Percentile

36.6%

When a Keycloak server is configured to support mTLS authentication for OAuth/OpenID clients, it does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client and therefore access data that belongs to other clients.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
CPENameOperatorVersion
org.keycloak:keycloak-serviceslt21.1.2

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

0.001 Low

EPSS

Percentile

36.6%