It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0650 | It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information. |
Github GHSA |
GHSA-4fgq-gq9g-3rw7 | Improper Verification of Cryptographic Signature in keycloak |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T22:17:19.324Z
Reserved: 2019-03-27T00:00:00.000Z
Link: CVE-2019-10201
No data.
Status : Modified
Published: 2019-08-14T17:15:11.143
Modified: 2024-11-21T04:18:38.627
Link: CVE-2019-10201
OpenCVE Enrichment
No data.
EUVD
Github GHSA