Description
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
References (7)
Scores
CVSS v3
3.5
EPSS
0.0011
EPSS Percentile
29.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N
Details
CWE
CWE-358
Status
published
Products (12)
org.keycloak/keycloak-server-spi-private
0 - 21.1.2Maven
org.keycloak/keycloak-services
0 - 21.1.2Maven
redhat/openshift_container_platform
4.11
redhat/openshift_container_platform
4.12
redhat/openshift_container_platform_for_ibm_z
4.9
redhat/openshift_container_platform_for_ibm_z
4.10
redhat/openshift_container_platform_for_linuxone
4.9
redhat/openshift_container_platform_for_linuxone
4.10
redhat/openshift_container_platform_for_power
4.9
redhat/openshift_container_platform_for_power
4.10
... and 2 more
Published
Dec 21, 2023
Tracked Since
Feb 18, 2026