It was found that Keycloaks SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.
This weakness has been deprecated because it covered redundant concepts already described in CWE-287.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keycloak | Redhat | * | 6.0.1 (including) |
Single_sign-on | Redhat | 7.0 (including) | 7.0 (including) |
Single_sign-on | Redhat | 7.3.3 (including) | 7.3.3 (including) |
Red Hat Runtimes Spring Boot 2.1.12 | RedHat | keycloak | * |
Red Hat Single Sign-On 7.3.3 zip | RedHat | keycloak | * |
Text-Only RHOAR | RedHat | * |