Privilege Escalation Affecting org.keycloak:keycloak-services package, versions [,3.3.0.Final)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.17% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Privilege Escalation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGKEYCLOAK-31564
  • published5 Nov 2017
  • disclosed15 Oct 2017
  • creditBart Toersche

Introduced: 15 Oct 2017

CVE-2017-12160  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade org.keycloak:keycloak-services to version 3.3.0.Final or higher.

Overview

org.keycloak:keycloak-services is an open Source Identity and Access Management for modern Applications and Services.

Affected versions of the package are vulnerable to Privilege Escalation. It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks

CVSS Scores

version 3.1