Description
A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:3883
https://access.redhat.com/errata/RHSA-2023:3884
https://access.redhat.com/errata/RHSA-2023:3885
https://access.redhat.com/errata/RHSA-2023:3888
https://access.redhat.com/errata/RHSA-2023:3892
https://access.redhat.com/security/cve/CVE-2023-2422
https://bugzilla.redhat.com/show_bug.cgi?id=2191668
Related Vulnerabilities
CVE-2020-13941 Vulnerability in maven package org.apache.solr:solr-core
CVE-2014-0119 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2022-23712 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2019-0193 Vulnerability in maven package org.apache.solr:solr-dataimporthandler
CVE-2023-32980 Vulnerability in maven package org.jenkins-ci.plugins:email-ext