CVE-2023-6544

Source
https://cve.org/CVERecord?id=CVE-2023-6544
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6544.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-6544
Aliases
Downstream
Related
Published
2024-04-25T15:58:47.204Z
Modified
2026-05-15T04:08:16.956313558Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Keycloak: authorization bypass
Details

A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an environment with this specific Dynamic Client Registration and TrustedDomain configuration previously unauthorized.

Database specific
{
    "cwe_ids": [
        "CWE-625"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6544.json",
    "cna_assigner": "redhat"
}
References

Affected packages