Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-5q66-v53q-pm35: Keycloak vulnerable to Plaintext Storage of User Password

A flaw was discovered in Keycloak Core package. When a user registers itself through registration flow, the “password” and “password-confirm” field from the form will occur as regular attributes in the users attributes. The password is also created, but the user attributes must not be there. This way, any entities (all users and clients with proper rights/roles) are able to retrieve the users passwords in clear-text.

Impact

Passwords for self-registered users are stored as cleartext attributes associated with the user.

Mitigation

Disable self-registration for users in all realms until patched.

ghsa
#git#java#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-4918

Keycloak vulnerable to Plaintext Storage of User Password

High severity GitHub Reviewed Published Sep 12, 2023 in keycloak/keycloak • Updated Sep 12, 2023

Package

maven org.keycloak:keycloak-core (Maven)

Affected versions

<= 22.0.2

A flaw was discovered in Keycloak Core package. When a user registers itself through registration flow, the “password” and “password-confirm” field from the form will occur as regular attributes in the users attributes. The password is also created, but the user attributes must not be there. This way, any entities (all users and clients with proper rights/roles) are able to retrieve the users passwords in clear-text.

Impact

Passwords for self-registered users are stored as cleartext attributes associated with the user.

Mitigation

Disable self-registration for users in all realms until patched.

References

  • GHSA-5q66-v53q-pm35

Published to the GitHub Advisory Database

Sep 12, 2023

Last updated

Sep 12, 2023

Related news

CVE-2023-4918: cve-details

A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment.