Description
A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:3883
https://access.redhat.com/errata/RHSA-2023:3884
https://access.redhat.com/errata/RHSA-2023:3885
https://access.redhat.com/errata/RHSA-2023:3888
https://access.redhat.com/errata/RHSA-2023:3892
https://access.redhat.com/security/cve/CVE-2023-2422
https://bugzilla.redhat.com/show_bug.cgi?id=2191668
Related Vulnerabilities
CVE-2023-42794 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2015-5348 Vulnerability in maven package org.apache.camel:camel-http-common
CVE-2022-24280 Vulnerability in maven package org.apache.pulsar:pulsar-proxy
CVE-2018-1000008 Vulnerability in maven package org.jvnet.hudson.plugins:pmd
CVE-2017-5644 Vulnerability in maven package org.apache.poi:poi-ooxml