Keycloak vulnerable to user impersonation via stolen UUID code
Description
Published to the GitHub Advisory Database
Mar 2, 2023
Reviewed
Mar 2, 2023
Published by the National Vulnerability Database
Aug 4, 2023
Last updated
Nov 7, 2023
Keycloak's OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.
References