Логотип exploitDog
bind:CVE-2026-1190
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1190

Количество 4

Количество 4

redhat логотип

CVE-2026-1190

2 месяца назад

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2026-1190

2 месяца назад

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2026-1190

2 месяца назад

A flaw was found in Keycloak's SAML brokering functionality. When Keyc ...

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-63v5-26vq-m4vm

2 месяца назад

Keycloak's missing timestamp validation allows attackers to extend SAML response validity periods

CVSS3: 3.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-1190

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.

CVSS3: 3.1
0%
Низкий
2 месяца назад
nvd логотип
CVE-2026-1190

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.

CVSS3: 3.1
0%
Низкий
2 месяца назад
debian логотип
CVE-2026-1190

A flaw was found in Keycloak's SAML brokering functionality. When Keyc ...

CVSS3: 3.1
0%
Низкий
2 месяца назад
github логотип
GHSA-63v5-26vq-m4vm

Keycloak's missing timestamp validation allows attackers to extend SAML response validity periods

CVSS3: 3.1
0%
Низкий
2 месяца назад

Уязвимостей на страницу