Untriaged
Keycloak: session takeover with oidc offline refreshtokens
A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
Affected products
keycloak
rh-sso7-keycloak
- *
rh-sso-7/sso76-openshift-rhel8
- *
Matching in nixpkgs
pkgs.keycloak
Identity and access management for modern applications and services
-
nixos-unstable -
- nixpkgs-unstable 26.3.4
pkgs.terraform-providers.keycloak
None
-
nixos-unstable -
- nixpkgs-unstable 5.4.0
pkgs.python312Packages.python-keycloak
Provides access to the Keycloak API
-
nixos-unstable -
- nixpkgs-unstable 4.0.0
pkgs.python313Packages.python-keycloak
Provides access to the Keycloak API
-
nixos-unstable -
- nixpkgs-unstable 4.0.0
Package maintainers
-
@ngerstle Nicholas Gerstle <ngerstle@gmail.com>
-
@NickCao Nick Cao <nickcao@nichi.co>
-
@talyz Kim Lindberger <kim.lindberger@gmail.com>
-
@leona-ya Leona Maroni <nix@leona.is>