Description
A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:3883
https://access.redhat.com/errata/RHSA-2023:3884
https://access.redhat.com/errata/RHSA-2023:3885
https://access.redhat.com/errata/RHSA-2023:3888
https://access.redhat.com/errata/RHSA-2023:3892
https://access.redhat.com/security/cve/CVE-2023-2422
https://bugzilla.redhat.com/show_bug.cgi?id=2191668
Related Vulnerabilities
CVE-2020-5404 Vulnerability in maven package io.projectreactor.netty:reactor-netty
CVE-2022-36893 Vulnerability in maven package org.jenkins-ci.plugins:rpmsign-plugin
CVE-2013-2033 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2014-0193 Vulnerability in maven package io.netty:netty-codec-http
CVE-2023-40572 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore