Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8698

Опубликовано: 19 сент. 2024
Источник: redhat
CVSS3: 7.7
EPSS Высокий

Описание

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

Отчет

This vulnerability is of high severity due to its potential to facilitate privilege escalation and user impersonation in systems using SAML for authentication. The core issue stems from improper validation logic in Keycloak's signature validation method, which relies on the position of signatures rather than explicitly checking the referenced elements. By manipulating the XML structure, an attacker can bypass signature validation and inject an unsigned assertion while retaining a valid signed one. This allows unauthorized access to high-privileged accounts, leading to significant security risks in SAML-based identity providers and service providers.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Build of Keycloakorg.keycloak/keycloak-saml-core-publicAffected
Red Hat Single Sign-On 7org.keycloak/keycloak-saml-core-publicAffected
Red Hat Build of KeycloakFixedRHSA-2024:688819.09.2024
Red Hat Build of Keycloakorg.keycloak/keycloak-saml-coreFixedRHSA-2024:689019.09.2024
Red Hat build of Keycloak 22rhbk/keycloak-operator-bundleFixedRHSA-2024:688719.09.2024
Red Hat build of Keycloak 22rhbk/keycloak-rhel9FixedRHSA-2024:688719.09.2024
Red Hat build of Keycloak 22rhbk/keycloak-rhel9-operatorFixedRHSA-2024:688719.09.2024
Red Hat build of Keycloak 24rhbk/keycloak-operator-bundleFixedRHSA-2024:688919.09.2024
Red Hat build of Keycloak 24rhbk/keycloak-rhel9FixedRHSA-2024:688919.09.2024
Red Hat build of Keycloak 24rhbk/keycloak-rhel9-operatorFixedRHSA-2024:688919.09.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-347
https://bugzilla.redhat.com/show_bug.cgi?id=2311641keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak

EPSS

Процентиль: 99%
0.79123
Высокий

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 7.7
nvd
больше 1 года назад

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

CVSS3: 7.7
debian
больше 1 года назад

A flaw exists in the SAML signature validation method within the Keycl ...

CVSS3: 7.7
github
около 1 года назад

Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak

CVSS3: 7.7
fstec
больше 1 года назад

Уязвимость класса XMLSignatureUtil программного средства для управления идентификацией и доступом Keycloak, позволяющая нарушителю обойти существующие ограничения безопасности и повысить свои привилегии

EPSS

Процентиль: 99%
0.79123
Высокий

7.7 High

CVSS3