Lucene search

K
githubGitHub Advisory DatabaseGHSA-4XX7-2CX3-X473
HistorySep 19, 2024 - 6:30 p.m.

Keycloak SAML signature validation flaw

2024-09-1918:30:52
CWE-347
GitHub Advisory Database
github.com
1
keycloak
saml
signature validation
xmlsignatureutil
flaw
xml
document
assertions
crafted responses
privilege escalation
impersonation attacks

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

40.0%

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

Affected configurations

Vulners
Node
org.keycloakkeycloak-saml-coreRange<25.0.6
VendorProductVersionCPE
org.keycloakkeycloak-saml-core*cpe:2.3:a:org.keycloak:keycloak-saml-core:*:*:*:*:*:*:*:*

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

40.0%