First published: Mon Jan 15 2024(Updated: )
A vulnerability was found in 3Scale when using with Keycloak 15 (or RHSSO 7.5.0) and superiors. When the auth_type is use_3scale_oidc_issuer_endpoint, Token Introspection policy discovers the Token Introspection endpoint from the token_introspection_endpoint field, but the field was removed on RH-SSO 7.5. As the result, the policy doesn't inspect tokens; it determines that all tokens are valid. Using an alternate auth_type: auth_type: client_id+client_secret. Disabling the policy entirely might be a temporary solution if the alternate {{auth_type is not feasible for some reason. The only purpose the token introspection endpoint serves is for sessions which are revoked in RH SSO *before the standard TTL expires via the exp claim.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Single Sign On | >=7.5.0 | |
Red Hat Keycloak | >=15 | |
Red Hat 3scale API Management Platform | ||
All of | ||
Red Hat 3scale | ||
Red Hat Keycloak | =15.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0560 has been classified as a moderate severity vulnerability.
To fix CVE-2024-0560, you should upgrade to the latest versions of Red Hat 3scale or Keycloak as recommended by the vendor.
CVE-2024-0560 affects Red Hat 3scale and Keycloak 15.0.0 as well as Red Hat Single Sign-On version 7.5.0 and above.
CVE-2024-0560 is an information disclosure vulnerability related to token introspection endpoint handling.
Currently, the best course of action for CVE-2024-0560 is to implement the recommended upgrades, as no specific workarounds have been provided.