CVE-2023-0657: Keycloak vulnerable to impersonation via logout token exchange
3.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19107%
CWE
Published
4/17/2024
Updated
11/18/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.keycloak:keycloak-services | maven | < 22.0.10 | 22.0.10 |
org.keycloak:keycloak-services | maven | >= 23.0.0, < 24.0.3 | 24.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper enforcement of token types during signature validation. Keycloak's OIDC token handling flow involves TokenManager
and TokenValidator
classes for token verification. The described flaw matches scenarios where these components validate()
cryptographic signatures without confirming the token's intended type (e.g., access token vs. logout token). The functions above are central to token validation and align with the CWEs listed (CWE-347, CWE-273), which indicate missing checks after cryptographic verification. While explicit patch details are unavailable, the vulnerability's mechanics strongly implicate these core token validation functions.