A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Keycloak Subscribe
Openshift Container Platform Subscribe
Red Hat Single Sign On Subscribe
Rhosemc Subscribe
Single Sign-on Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1672 A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Github GHSA Github GHSA GHSA-3qh5-qqj2-c78f Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-02T06:19:15.138Z

Reserved: 2023-04-28T17:33:42.062Z

Link: CVE-2023-2422

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:15.138Z

cve-icon NVD

Status : Modified

Published: 2023-10-04T11:15:10.157

Modified: 2024-11-21T07:58:35.333

Link: CVE-2023-2422

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-06-26T00:00:00Z

Links: CVE-2023-2422 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses