Description
It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
Published: 2017-10-26
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4944 It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
Github GHSA Github GHSA GHSA-qc72-gfvw-76h7 Keycloak Oauth Implementation Error
History

No history.

Subscriptions

Redhat Jboss Single Sign On Keycloak Red Hat Single Sign On
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-09-16T18:48:51.709Z

Reserved: 2017-08-01T00:00:00.000Z

Link: CVE-2017-12160

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-10-26T17:29:00.297

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-12160

cve-icon Redhat

Severity : Low

Publid Date: 2017-10-17T00:00:00Z

Links: CVE-2017-12160 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses