Skip to content

User impersonation via stolen UUID code

High
stianst published GHSA-9g98-5mj6-f9mv Mar 2, 2023

Package

maven org.keycloak (Maven)

Affected versions

< 21.0.1

Patched versions

21.0.1

Description

Keycloak's OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.

Severity

High
8.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

CVE ID

CVE-2023-0264

Weaknesses

Credits