Lucene search

K
osvGoogleOSV:GHSA-4XX7-2CX3-X473
HistorySep 19, 2024 - 6:30 p.m.

Keycloak SAML signature validation flaw

2024-09-1918:30:52
Google
osv.dev
1
keycloak
saml
signature validation
xmlsignatureutil
crafted responses
bypassing validation
privilege escalation
impersonation attacks

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

40.0%

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

40.0%