Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-2585


Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.


Published

2023-12-21T10:15:34.533

Last Modified

2024-11-21T07:58:52.737

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 3.5 (LOW)

Weaknesses
  • Type: Secondary
    CWE-358
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat single_sign-on 7.6 Yes
Operating System redhat enterprise_linux 7.0 No
Operating System redhat enterprise_linux 8.0 No
Operating System redhat enterprise_linux 9.0 No
Application redhat openshift_container_platform 4.11 Yes
Application redhat openshift_container_platform 4.12 Yes
Application redhat openshift_container_platform_for_ibm_z 4.9 Yes
Application redhat openshift_container_platform_for_ibm_z 4.10 Yes
Application redhat openshift_container_platform_for_linuxone 4.9 Yes
Application redhat openshift_container_platform_for_linuxone 4.10 Yes
Application redhat openshift_container_platform_for_power 4.9 Yes
Application redhat openshift_container_platform_for_power 4.10 Yes
Operating System redhat enterprise_linux 8.0 No
Application redhat single_sign-on - Yes

References