Duplicate Advisory: Keycloak SAML signature validation flaw
Moderate severity
GitHub Reviewed
Published
Sep 19, 2024
to the GitHub Advisory Database
•
Updated Dec 20, 2024
Withdrawn
This advisory was withdrawn on Dec 20, 2024
Description
Published by the National Vulnerability Database
Sep 19, 2024
Published to the GitHub Advisory Database
Sep 19, 2024
Reviewed
Sep 19, 2024
Withdrawn
Dec 20, 2024
Last updated
Dec 20, 2024
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-xgfv-xpx8-qhcr. This link is maintained to preserve external references.
Original Description
A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.
References