Vulnerability Description
An information disclosure vulnerability exists in the challenge functionality of instipod DuoUniversalKeycloakAuthenticator 1.0.7 plugin. A specially crafted HTTP request can lead to a disclosure of sensitive information. A user logging into Keycloak using DuoUniversalKeycloakAuthenticator plugin triggers this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Michaelkelly | Duouniversalkeycloakauthenticator | < 1.0.8 |
Related Weaknesses (CWE)
References
- https://github.com/instipod/DuoUniversalKeycloakAuthenticator/releases/tag/1.0.8Release Notes
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1907ExploitThird Party Advisory
- https://github.com/instipod/DuoUniversalKeycloakAuthenticator/releases/tag/1.0.8Release Notes
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1907ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1907
FAQ
What is CVE-2023-49594?
CVE-2023-49594 is a vulnerability with a CVSS score of 4.5 (MEDIUM). An information disclosure vulnerability exists in the challenge functionality of instipod DuoUniversalKeycloakAuthenticator 1.0.7 plugin. A specially crafted HTTP request can lead to a disclosure of s...
How severe is CVE-2023-49594?
CVE-2023-49594 has been rated MEDIUM with a CVSS base score of 4.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49594?
Check the references section above for vendor advisories and patch information. Affected products include: Michaelkelly Duouniversalkeycloakauthenticator.