First published: Thu Jan 05 2017(Updated: )
It was found that Picketlink implementation replaces special strings for obtaining attribute values with system property values in SAML messages while parsing. An attacker can misuse this to determine values of system properties at the attacked system by formatting the SAML request ID field to the chosen system property name of his liking, obtaining the property value in "InResponseTo" field in the response. Upstream bug (for Keycloak): <a href="https://issues.jboss.org/browse/KEYCLOAK-4160">https://issues.jboss.org/browse/KEYCLOAK-4160</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-core | <2.5.1 | 2.5.1 |
Redhat Keycloak | <2.5.1 | |
Redhat Jboss Enterprise Application Platform | =6.0.0 | |
Redhat Jboss Enterprise Application Platform | =6.4.0 | |
Redhat Jboss Enterprise Application Platform | =7.0.0 | |
Redhat Jboss Enterprise Application Platform | =7.1.0 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 |
https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.