Lucene search

K
githubGitHub Advisory DatabaseGHSA-M6Q9-P373-G5Q8
HistoryApr 17, 2024 - 6:24 p.m.

Keycloak's unvalidated cross-origin messages in checkLoginIframe leads to DDoS

2024-04-1718:24:38
CWE-346
GitHub Advisory Database
github.com
24
keycloak
ddos
cross-origin messages
vulnerability
checkloginiframe

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

13.0%

A potential security flaw in the β€œcheckLoginIframe” which allows unvalidated cross-origin messages, enabling potential DDoS attacks. By exploiting this vulnerability, attackers could coordinate to send millions of requests in seconds using simple code, significantly impacting the application’s availability without proper origin validation for incoming messages.

Acknowledgements

Special thanks to Adriano MΓ‘rcio Monteiro from BRZTEC for reporting this issue and helping us improve our project.

Affected configurations

Vulners
Node
org.keycloakkeycloak-servicesRange23.0.0–24.0.3
OR
org.keycloakkeycloak-servicesRange<22.0.10
VendorProductVersionCPE
org.keycloakkeycloak-services*cpe:2.3:a:org.keycloak:keycloak-services:*:*:*:*:*:*:*:*

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

13.0%