VYPR
High severity7.2NVD Advisory· Published Oct 26, 2017· Updated May 13, 2026

CVE-2017-12160

CVE-2017-12160

Description

It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-parentMaven
< 3.3.0.Final3.3.0.Final

Affected products

2
  • cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*
  • Red Hat, Inc./keycloakv5
    Range: 3.4.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.