A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-7575 A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
Github GHSA Github GHSA GHSA-97g8-xfvw-q4hg Keycloak vulnerable to session takeover with OIDC offline refreshtokens
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T01:20:58.791Z

Reserved: 2022-11-09T16:12:41.804Z

Link: CVE-2022-3916

cve-icon Vulnrichment

Updated: 2024-08-03T01:20:58.791Z

cve-icon NVD

Status : Modified

Published: 2023-09-20T15:15:11.583

Modified: 2024-11-21T07:20:31.480

Link: CVE-2022-3916

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-11-09T00:00:00Z

Links: CVE-2022-3916 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses