CWE
280
Advisory Published
CVE Published
Updated

CVE-2024-0560: Apicast: use_3scale_oidc_issuer_endpoint of token introspection policy isn't compatible with rh-sso 7.5 or later versions

First published: Mon Jan 15 2024(Updated: )

A vulnerability was found in 3Scale when using with Keycloak 15 (or RHSSO 7.5.0) and superiors. When the auth_type is use_3scale_oidc_issuer_endpoint, Token Introspection policy discovers the Token Introspection endpoint from the token_introspection_endpoint field, but the field was removed on RH-SSO 7.5. As the result, the policy doesn't inspect tokens; it determines that all tokens are valid. Using an alternate auth_type: auth_type: client_id+client_secret. Disabling the policy entirely might be a temporary solution if the alternate {{auth_type is not feasible for some reason. The only purpose the token introspection endpoint serves is for sessions which are revoked in RH SSO *before the standard TTL expires via the exp claim.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Red Hat Single Sign On>=7.5.0
Red Hat Keycloak>=15
Red Hat 3scale API Management Platform
All of
Red Hat 3scale
Red Hat Keycloak=15.0.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-0560?

    CVE-2024-0560 has been classified as a moderate severity vulnerability.

  • How do I fix CVE-2024-0560?

    To fix CVE-2024-0560, you should upgrade to the latest versions of Red Hat 3scale or Keycloak as recommended by the vendor.

  • What systems are affected by CVE-2024-0560?

    CVE-2024-0560 affects Red Hat 3scale and Keycloak 15.0.0 as well as Red Hat Single Sign-On version 7.5.0 and above.

  • What type of vulnerability is CVE-2024-0560?

    CVE-2024-0560 is an information disclosure vulnerability related to token introspection endpoint handling.

  • Is there a workaround for CVE-2024-0560?

    Currently, the best course of action for CVE-2024-0560 is to implement the recommended upgrades, as no specific workarounds have been provided.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203