Keycloaks device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Single_sign-on | Redhat | 7.6 (including) | 7.6 (including) |