Description
A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Published: 2023-10-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-1672 A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Github GHSA Github GHSA GHSA-3qh5-qqj2-c78f Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients
History

No history.

Subscriptions

Redhat Enterprise Linux Keycloak Openshift Container Platform Red Hat Single Sign On Rhosemc Single Sign-on
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-02T06:19:15.138Z

Reserved: 2023-04-28T17:33:42.062Z

Link: CVE-2023-2422

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:15.138Z

cve-icon NVD

Status : Modified

Published: 2023-10-04T11:15:10.157

Modified: 2024-11-21T07:58:35.333

Link: CVE-2023-2422

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-06-26T00:00:00Z

Links: CVE-2023-2422 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses