CVE-2019-10201
14.08.2019, 17:15
It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | keycloak | 𝑥 ≤ 6.0.1 |
redhat | single_sign-on | 7.0 |
redhat | single_sign-on | 7.3.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-592 - DEPRECATED: Authentication Bypass IssuesThis weakness has been deprecated because it covered redundant concepts already described in CWE-287.
- CWE-347 - Improper Verification of Cryptographic SignatureThe software does not verify, or incorrectly verifies, the cryptographic signature for data.