Lucene search

K
githubGitHub Advisory DatabaseGHSA-M6Q9-P373-G5Q8
HistoryApr 17, 2024 - 6:24 p.m.

Keycloak's unvalidated cross-origin messages in checkLoginIframe leads to DDoS

2024-04-1718:24:38
CWE-346
GitHub Advisory Database
github.com
18
keycloak
ddos
cross-origin messages
vulnerability
checkloginiframe

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

13.1%

A potential security flaw in the β€œcheckLoginIframe” which allows unvalidated cross-origin messages, enabling potential DDoS attacks. By exploiting this vulnerability, attackers could coordinate to send millions of requests in seconds using simple code, significantly impacting the application’s availability without proper origin validation for incoming messages.

Acknowledgements

Special thanks to Adriano MΓ‘rcio Monteiro from BRZTEC for reporting this issue and helping us improve our project.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

13.1%