First published: Wed Jul 10 2019(Updated: )
If an attacker modifies the SAML Response and removes the <Signature> Sections, the message is still accepted and the message can be modified, allowing the attacker to impersonate any user on the keycloak protected systems by modifying assertations. Upstream Issue: <a href="https://issues.jboss.org/browse/KEYCLOAK-10786">https://issues.jboss.org/browse/KEYCLOAK-10786</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <7.0.0 | 7.0.0 |
Redhat Keycloak | <=6.0.1 | |
Redhat Single Sign-on | =7.0 | |
Redhat Single Sign-on | =7.3.3 |
Administrator can prevent this issue for POST binding by requiring signed assertions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10201 is a vulnerability in Keycloak's SAML broker that allows an attacker to modify SAML Response messages without detection.
CVE-2019-10201 has a severity score of 8.1 out of 10, indicating a high-risk vulnerability.
The affected software is Keycloak versions up to 6.0.1.
An attacker can exploit CVE-2019-10201 by modifying SAML Response messages and removing the <Signature> sections without detection.
To fix CVE-2019-10201, update Keycloak to version 7.0.0 or higher.