Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-services
  4. ›
  5. GMS-2023-573

GMS-2023-573: Keycloak vulnerable to user impersonation via stolen UUID code

August 4, 2023 (updated August 14, 2023)

Keycloak’s OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.

References

  • github.com/advisories/GHSA-9g98-5mj6-f9mv
  • github.com/keycloak/keycloak/commit/ec8109112e67208c13e13f6d1f8706a5a3ba8d4c
  • github.com/keycloak/keycloak/security/advisories/GHSA-9g98-5mj6-f9mv

Code Behaviors & Features

Detect and mitigate GMS-2023-573 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 18.0.6

Fixed versions

  • 19.0.0

Solution

Upgrade to version 19.0.0 or above.

Impact 5 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

maven/org.keycloak/keycloak-services/GMS-2023-573.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:07 +0000.