Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12aHZxLWpoMzQtM2ZjOM4AAw9x
Duplicate Advisory: Keycloak allows impersonation and lockout due to email trust not being handled correctly
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-c7xw-p58w-h6fj. This link is maintained to preserve external references.
Original Description
A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.
Permalink: https://github.com/advisories/GHSA-vhvq-jh34-3fc8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12aHZxLWpoMzQtM2ZjOM4AAw9x
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: 9 months ago Widthdrawn: 9 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Identifiers: GHSA-vhvq-jh34-3fc8
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-0105
- https://access.redhat.com/security/cve/CVE-2023-0105
- https://bugzilla.redhat.com/show_bug.cgi?id=2158910
- https://github.com/advisories/GHSA-vhvq-jh34-3fc8
Affected Packages
maven:org.keycloak:keycloak-core
Dependent packages: 376Dependent repositories: 1,153
Downloads:
Affected Version Ranges: <= 20.0.2
No known fixed version
All affected versions: 5.0.0, 6.0.0, 6.0.1, 7.0.0, 7.0.1, 8.0.0, 8.0.1, 8.0.2, 9.0.0, 9.0.2, 9.0.3, 10.0.0, 10.0.1, 10.0.2, 11.0.0, 11.0.1, 11.0.2, 11.0.3, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, 13.0.0, 13.0.1, 14.0.0, 15.0.0, 15.0.1, 15.0.2, 15.1.0, 15.1.1, 16.0.0, 16.1.0, 16.1.1, 17.0.0, 17.0.1, 18.0.0, 18.0.1, 18.0.2, 19.0.0, 19.0.1, 19.0.2, 19.0.3, 20.0.0, 20.0.1, 20.0.2