Description
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:3883
https://access.redhat.com/errata/RHSA-2023:3884
https://access.redhat.com/errata/RHSA-2023:3885
https://access.redhat.com/errata/RHSA-2023:3888
https://access.redhat.com/errata/RHSA-2023:3892
https://access.redhat.com/security/cve/CVE-2023-2585
https://bugzilla.redhat.com/show_bug.cgi?id=2196335
Related Vulnerabilities
CVE-2012-2379 Vulnerability in maven package org.apache.cxf:cxf-bundle-minimal
CVE-2017-7661 Vulnerability in maven package org.apache.cxf.fediz:fediz-spring
CVE-2011-1088 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-common_2.10
CVE-2015-5346 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core