First published: Wed Sep 11 2024(Updated: )
The SAML signature validation method in Keycloak uses the position of the signature within the XML document to determine if the signature is for the full document or an assertion. This approach can be exploited by attackers to bypass signature validation and perform unauthorized actions.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2311641 is high due to the potential for unauthorized actions resulting from exploited signature validation bypass.
To fix REDHAT-BUG-2311641, update to the latest patched version of Red Hat Keycloak as provided in the official advisories.
The risks associated with REDHAT-BUG-2311641 include allowing attackers to bypass signature validation and conduct unauthorized operations.
REDHAT-BUG-2311641 affects users of Red Hat Keycloak who rely on SAML for authentication.
REDHAT-BUG-2311641 was reported recently and has been addressed in the latest security advisories from Red Hat.