Show filters
175 Total Results
Displaying 61-70 of 175
Sort by:
Attacker Value
Unknown
CVE-2023-2422
Disclosure Date: October 04, 2023 (last updated February 25, 2025)
A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
0
Attacker Value
Unknown
CVE-2022-4137
Disclosure Date: September 25, 2023 (last updated February 25, 2025)
A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.
0
Attacker Value
Unknown
CVE-2022-3916
Disclosure Date: September 20, 2023 (last updated February 25, 2025)
A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
0
Attacker Value
Unknown
CVE-2022-1438
Disclosure Date: September 20, 2023 (last updated February 25, 2025)
A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.
0
Attacker Value
Unknown
CVE-2023-4918
Disclosure Date: September 12, 2023 (last updated February 25, 2025)
A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment.
0
Attacker Value
Unknown
CVE-2023-0264
Disclosure Date: August 04, 2023 (last updated February 25, 2025)
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2022-4361
Disclosure Date: July 07, 2023 (last updated February 25, 2025)
Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.
0
Attacker Value
Unknown
CVE-2023-1664
Disclosure Date: May 26, 2023 (last updated February 25, 2025)
A flaw was found in Keycloak. This flaw depends on a non-default configuration "Revalidate Client Certificate" to be enabled and the reverse proxy is not validating the certificate before Keycloak. Using this method an attacker may choose the certificate which will be validated by the server. If this happens and the KC_SPI_TRUSTSTORE_FILE_FILE variable is missing/misconfigured, any trustfile may be accepted with the logging information of "Cannot validate client certificate trust: Truststore not available". This may not impact availability as the attacker would have no access to the server, but consumer applications Integrity or Confidentiality may be impacted considering a possible access to them. Considering the environment is correctly set to use "Revalidate Client Certificate" this flaw is avoidable.
0
Attacker Value
Unknown
CVE-2023-1477
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
Improper Authentication vulnerability in HYPR Keycloak Authenticator Extension allows Authentication Abuse.This issue affects HYPR Keycloak Authenticator Extension: before 7.10.2, before 8.0.3.
0
Attacker Value
Unknown
CVE-2022-1274
Disclosure Date: March 29, 2023 (last updated February 24, 2025)
A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.
0