CVE-2023-2585

LOW

Keycloak - Auth Bypass

Title source: llm
STIX 2.1

Description

Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.

Scores

CVSS v3 3.5
EPSS 0.0011
EPSS Percentile 29.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N

Details

CWE
CWE-358
Status published
Products (12)
org.keycloak/keycloak-server-spi-private 0 - 21.1.2Maven
org.keycloak/keycloak-services 0 - 21.1.2Maven
redhat/openshift_container_platform 4.11
redhat/openshift_container_platform 4.12
redhat/openshift_container_platform_for_ibm_z 4.9
redhat/openshift_container_platform_for_ibm_z 4.10
redhat/openshift_container_platform_for_linuxone 4.9
redhat/openshift_container_platform_for_linuxone 4.10
redhat/openshift_container_platform_for_power 4.9
redhat/openshift_container_platform_for_power 4.10
... and 2 more
Published Dec 21, 2023
Tracked Since Feb 18, 2026