Description
A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:3883
https://access.redhat.com/errata/RHSA-2023:3884
https://access.redhat.com/errata/RHSA-2023:3885
https://access.redhat.com/errata/RHSA-2023:3888
https://access.redhat.com/errata/RHSA-2023:3892
https://access.redhat.com/security/cve/CVE-2023-2422
https://bugzilla.redhat.com/show_bug.cgi?id=2191668
Related Vulnerabilities
CVE-2016-0734 Vulnerability in maven package org.apache.activemq:activemq-parent
CVE-2019-1003060 Vulnerability in maven package org.jenkins-ci.plugins:zap
CVE-2023-29019 Vulnerability in npm package @fastify/passport
CVE-2015-2944 Vulnerability in maven package org.apache.sling:org.apache.sling.servlets.post