Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1190

Опубликовано: 19 янв. 2026
Источник: redhat
CVSS3: 3.1
EPSS Низкий

Описание

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the NotOnOrAfter timestamp within the SubjectConfirmationData. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.

Отчет

This vulnerability is rated Low for Red Hat products. In the Red Hat context, this flaw in Keycloak's SAML brokering functionality allows an attacker to delay the expiration of SAML responses by not validating the NotOnOrAfter timestamp in SubjectConfirmationData. This could lead to unexpected session durations or increased resource consumption.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 8keycloak-servicesFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packkeycloak-servicesFix deferred
Red Hat Single Sign-On 7keycloak-servicesFix deferred
Red Hat build of Keycloak 26.4rhbk/keycloak-operator-bundleFixedRHSA-2026:394805.03.2026
Red Hat build of Keycloak 26.4rhbk/keycloak-rhel9FixedRHSA-2026:394805.03.2026
Red Hat build of Keycloak 26.4rhbk/keycloak-rhel9-operatorFixedRHSA-2026:394805.03.2026
Red Hat build of Keycloak 26.4.10rhbk/keycloak-rhel9FixedRHSA-2026:394705.03.2026

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-112
https://bugzilla.redhat.com/show_bug.cgi?id=2430835org.keycloak/keycloak-services: Keycloak SAML brokering: Response delay due to unchecked NotOnOrAfter in SubjectConfirmationData

EPSS

Процентиль: 4%
0.00016
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
nvd
2 месяца назад

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.

CVSS3: 3.1
debian
2 месяца назад

A flaw was found in Keycloak's SAML brokering functionality. When Keyc ...

CVSS3: 3.1
github
2 месяца назад

Keycloak's missing timestamp validation allows attackers to extend SAML response validity periods

EPSS

Процентиль: 4%
0.00016
Низкий

3.1 Low

CVSS3