A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 6
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*
|
— | — |
|
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:*:*:*:*
|
— | — |
|
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.2.14:*:*:*:*:*:*:*
|
— | — |
|
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:*:*:*:*
|
— | — |
|
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.4.10:*:*:*:*:*:*:*
|
— | — |
|
Redhat Keycloak
cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*
|
— | — |