Description
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1780 | Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client. |
Github GHSA |
GHSA-f5h4-wmp5-xhg6 | Client Spoofing within the Keycloak Device Authorisation Grant |
References
History
No history.
Subscriptions
Redhat
Subscribe
Enterprise Linux
Subscribe
Openshift Container Platform
Subscribe
Openshift Container Platform For Ibm Z
Subscribe
Openshift Container Platform For Linuxone
Subscribe
Openshift Container Platform For Power
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
Single Sign-on
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T06:26:09.896Z
Reserved: 2023-05-08T19:39:58.370Z
Link: CVE-2023-2585
No data.
Status : Modified
Published: 2023-12-21T10:15:34.533
Modified: 2024-11-21T07:58:52.737
Link: CVE-2023-2585
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA