A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1672 | A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients. |
Github GHSA |
GHSA-3qh5-qqj2-c78f | Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T06:19:15.138Z
Reserved: 2023-04-28T17:33:42.062Z
Link: CVE-2023-2422
Updated: 2024-08-02T06:19:15.138Z
Status : Modified
Published: 2023-10-04T11:15:10.157
Modified: 2024-11-21T07:58:35.333
Link: CVE-2023-2422
OpenCVE Enrichment
No data.
EUVD
Github GHSA