First published: Tue Sep 11 2018(Updated: )
The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Keycloak | <4.6.0. | 4.6.0. |
Red Hat Keycloak | <4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14637 has been classified with a high severity due to its potential for replay attacks.
To resolve CVE-2018-14637, upgrade Keycloak to version 4.6.0.Final or later.
CVE-2018-14637 affects Keycloak versions prior to 4.6.0.Final.
CVE-2018-14637 can facilitate replay attacks due to the ignoring of expiration conditions on SAML assertions.
There is no known workaround for CVE-2018-14637; upgrading to the patched version is the recommended approach.