[MAVEN:GHSA-9G98-5MJ6-F9MV] Keycloak vulnerable to user impersonation via stolen UUID code

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 1

Keycloak's OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.

Package Affected Version
pkg:maven/org.keycloak/keycloak-services < 21.0.1
Package Fixed Version
pkg:maven/org.keycloak/keycloak-services = 21.0.1
ID
MAVEN:GHSA-9G98-5MJ6-F9MV
Severity
high
URL
https://github.com/advisories/GHSA-9g98-5mj6-f9mv
Published
2023-03-02T23:25:43
(18 months ago)
Modified
2023-11-07T05:05:49
(10 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.keycloak/keycloak-services org.keycloak keycloak-services < 21.0.1
Fixed pkg:maven/org.keycloak/keycloak-services org.keycloak keycloak-services = 21.0.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...