Total vulnerabilities in the database
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Software | From | Fixed in |
---|---|---|
![]() |
- | 21.1.2 |
![]() |
- | 21.1.2 |
redhat / single_sign-on | 7.6 | 7.6.x |
redhat / openshift_container_platform | 4.11 | 4.11.x |
redhat / openshift_container_platform | 4.12 | 4.12.x |
redhat / openshift_container_platform_for_ibm_z | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_ibm_z | 4.10 | 4.10.x |
redhat / openshift_container_platform_for_linuxone | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_linuxone | 4.10 | 4.10.x |
redhat / openshift_container_platform_for_power | 4.9 | 4.9.x |
redhat / openshift_container_platform_for_power | 4.10 | 4.10.x |