We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-0657

Keycloak: impersonation via logout token exchange



Description

A flaw was found in Keycloak. This issue occurs due to improperly enforcing token types when validating signatures locally. This could allow an authenticated attacker to exchange a logout token for an access token and possibly gain access to data outside of enforced permissions.

Reserved 2023-02-02 | Published 2024-11-17 | Updated 2024-11-17 | Assigner redhat


LOW: 3.4CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

Problem types

Improper Check for Dropped Privileges

Product status

Default status
unaffected

Any version before 22.0.10
affected

23.0.0 before 24.0.3
affected

Default status
affected

22.0.10-1 before *
unaffected

Default status
affected

22-13 before *
unaffected

Default status
affected

22-16 before *
unaffected

Default status
unaffected

Default status
affected

Timeline

2023-02-02:Reported to Red Hat.
2024-04-16:Made public.

References

access.redhat.com/errata/RHSA-2024:1867 (RHSA-2024:1867) vendor-advisory

access.redhat.com/errata/RHSA-2024:1868 (RHSA-2024:1868) vendor-advisory

access.redhat.com/security/cve/CVE-2023-0657 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2166728 (RHBZ#2166728) issue-tracking

cve.org (CVE-2023-0657)

nvd.nist.gov (CVE-2023-0657)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-0657

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.