Client access via device auth request spoof
CVE-2023-2585
3.5LOW
Key Information:
- Vendor
Red Hat
- Status
- Vendor
- CVE Published:
- 21 December 2023
What is CVE-2023-2585?
Keycloak's device authorization grant has a flaw in its validation process, which allows attackers to potentially spoof requests. By leveraging this vulnerability, an attacker could manipulate the consent flow, leading authorization administrators to unknowingly approve access for a malicious OAuth client. This can result in unauthorized access to sensitive information or systems that rely on valid OAuth client consent.
Affected Version(s)
Red Hat Single Sign-On 7.6 for RHEL 7 0:18.0.8-1.redhat_00001.1.el7sso
Red Hat Single Sign-On 7.6 for RHEL 8 0:18.0.8-1.redhat_00001.1.el8sso
Red Hat Single Sign-On 7.6 for RHEL 9 0:18.0.8-1.redhat_00001.1.el9sso