Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
This Cyber News was published on www.tenable.com. Publication date: Fri, 22 Dec 2023 10:46:03 +0000