Severity
9.8CRITICALNVD
EPSS
0.4%
top 37.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 8
Latest updateJul 12

Description

A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDredhat/keycloak< 18.0.0
CVEListV5redhat/keycloakkeycloak versions prior to 18.0.0

🔴Vulnerability Details

3
CVEList
CVE-2022-1245: A privilege escalation flaw was found in the token exchange feature of keycloak2022-07-07
GHSA
Keycloak vulnerable to privilege escalation on Token Exchange feature2022-04-26
OSV
Keycloak vulnerable to privilege escalation on Token Exchange feature2022-04-26

📋Vendor Advisories

28
Microsoft
Chromium: CVE-2022-2294 Heap buffer overflow in WebRTC2022-07-12
Microsoft
Chromium: CVE-2022-2007 Use after free in WebGPU2022-06-14
Microsoft
Chromium: CVE-2022-2010 Out of bounds read in compositing2022-06-14
Microsoft
Chromium: CVE-2022-2011 Use after free in ANGLE2022-06-14
Microsoft
Chromium: CVE-2022-2008 Out of bounds memory access in WebGL2022-06-14