Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-parent
  4. ›
  5. CVE-2017-12160

CVE-2017-12160: Improper Authentication

May 13, 2022 (updated July 25, 2023)

It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.

References

  • access.redhat.com/errata/RHSA-2017:2904
  • access.redhat.com/errata/RHSA-2017:2905
  • access.redhat.com/errata/RHSA-2017:2906
  • bugzilla.redhat.com/show_bug.cgi?id=1484154
  • github.com/advisories/GHSA-qc72-gfvw-76h7
  • nvd.nist.gov/vuln/detail/CVE-2017-12160

Code Behaviors & Features

Detect and mitigate CVE-2017-12160 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3.3.0.final

Solution

Unfortunately, there is no solution available yet.

Impact 7.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

maven/org.keycloak/keycloak-parent/CVE-2017-12160.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:56 +0000.