Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-parent
  4. ›
  5. GMS-2022-8406

GMS-2022-8406: Keycloak vulnerable to session takeover with OIDC offline refreshtokens

September 20, 2023 (updated November 7, 2023)

An issue was discovered in Keycloak when using a client with the offline_access scope. Reuse of session ids across root and user authentication sessions and a lack of root session validation enabled attackers to resolve a user session attached to a different previously authenticated user.

This issue most affects users of shared computers. Suppose a user logs out of their account (without clearing their cookies) in a mobile app or similar client that includes the offline_access scope, and another user authenticates to the application. In that case, it will share the same root session id, and when utilizing the refresh token, they will be issued a token for the original user.

References

  • github.com/advisories/GHSA-97g8-xfvw-q4hg
  • github.com/keycloak/keycloak/security/advisories/GHSA-97g8-xfvw-q4hg

Code Behaviors & Features

Detect and mitigate GMS-2022-8406 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 20.0.2

Fixed versions

  • 20.0.2

Solution

Upgrade to version 20.0.2 or above.

Impact 6.8 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-613: Insufficient Session Expiration

Source file

maven/org.keycloak/keycloak-parent/GMS-2022-8406.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:37 +0000.