Improper Verification of Cryptographic Signature
CVE-2024-8698
Summary
A flaw exists in the SAML signature validation method within the Keycloak "XMLSignatureUtil" class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks. This issue affects org.keycloak:keycloak-saml-core versions prior to 25.0.6.
- HIGH
- NETWORK
- LOW
- CHANGED
- NONE
- LOW
- HIGH
- LOW
CWE-347 - Improper Verification of Cryptographic Signature
A cryptographic protocol is meant to ensure that services are provided in a secure manner. An application with absent or improper verification of cryptographic signatures allows malicious users to feed false messages to valid users or to disclose sensitive data, subverting the goals of the protocol. This can lead to security failures such as false authentication, account hijacking, and privilege escalation.
References
Advisory Timeline
- Published