Description
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
Published: 2023-08-04
Score: 5.0 Medium
EPSS: 4.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-0967 A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
Github GHSA Github GHSA GHSA-9g98-5mj6-f9mv Keycloak vulnerable to user impersonation via stolen UUID code
History

No history.

Subscriptions

Redhat Enterprise Linux Keycloak Openshift Container Platform Openshift Container Platform For Ibm Linuxone Openshift Container Platform Ibm Z Systems Red Hat Single Sign On Rhosemc Single Sign-on
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-02T05:02:44.110Z

Reserved: 2023-01-12T23:10:37.812Z

Link: CVE-2023-0264

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-08-04T18:15:11.090

Modified: 2024-11-21T07:36:51.503

Link: CVE-2023-0264

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-02-28T18:58:00Z

Links: CVE-2023-0264 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses