It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.
2019-08-14T17:15:11.143
2024-11-21T04:18:38.627
Modified
CVSSv3.1: 8.1 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:N
8.0
4.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | redhat | keycloak | ≤ 6.0.1 | Yes |
| Application | redhat | single_sign-on | 7.0 | Yes |
| Application | redhat | single_sign-on | 7.3.3 | Yes |