Lucene search

K
githubGitHub Advisory DatabaseGHSA-4PC7-VQV5-5R3V
HistoryApr 27, 2022 - 9:25 p.m.

ECP SAML binding bypasses authentication flows

2022-04-2721:25:59
CWE-287
GitHub Advisory Database
github.com
30
keycloak
ecp binding
authentication bypass
soap request
mfa
confidentiality
integrity

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.002

Percentile

52.1%

Description

A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user’s credentials. The highest threat from this vulnerability is to confidentiality and integrity.

Affected configurations

Vulners
Node
org.keycloakkeycloak-saml-coreRange<18.0.0
VendorProductVersionCPE
org.keycloakkeycloak-saml-core*cpe:2.3:a:org.keycloak:keycloak-saml-core:*:*:*:*:*:*:*:*

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.002

Percentile

52.1%