Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
2023-12-21T10:15:34.533
2024-11-21T07:58:52.737
Modified
CVSSv3.1: 3.5 (LOW)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | single_sign-on | 7.6 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |
Operating System | redhat | enterprise_linux | 8.0 | No |
Operating System | redhat | enterprise_linux | 9.0 | No |
Application | redhat | openshift_container_platform | 4.11 | Yes |
Application | redhat | openshift_container_platform | 4.12 | Yes |
Application | redhat | openshift_container_platform_for_ibm_z | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_ibm_z | 4.10 | Yes |
Application | redhat | openshift_container_platform_for_linuxone | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_linuxone | 4.10 | Yes |
Application | redhat | openshift_container_platform_for_power | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_power | 4.10 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | No |
Application | redhat | single_sign-on | - | Yes |