Improper Certificate Validation Affecting org.keycloak:keycloak-core package, versions [0,21.1.2)
Threat Intelligence
EPSS
0.05% (24th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGKEYCLOAK-5291542
- published 28 Mar 2023
- disclosed 27 Mar 2023
- credit Unknown
Introduced: 27 Mar 2023
CVE-2023-1664 Open this link in a new tabHow to fix?
Upgrade org.keycloak:keycloak-core
to version 21.1.2 or higher.
Overview
org.keycloak:keycloak-core is an open source identity and access management solution.
Affected versions of this package are vulnerable to Improper Certificate Validation due to allowing unintended access of an untrusted certificate when using Revalidate Client Certificate
and when KC_SPI_TRUSTSTORE_FILE_FILE
is misconfigured.
References
CVSS Scores
version 3.1