SB2021052530 - Multiple vulnerabilities in Keycloak
Published: May 25, 2021 Updated: May 25, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 vulnerabilities.
1) Insufficient Session Expiration (CVE-ID: CVE-2021-3461)
The vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due to the way Keycloak handles backchannel logout requests. If the logout request comes from an external SAML identity provider and Principal Type is set to Attribute [Name], the application ignores such request.
2) Spoofing attack (CVE-ID: CVE-2021-3424)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user IDN names. A remote attacker can register with an IDN name, which looks exactly like a name of previously registered user and trick the application administrator into assigning higher privileges to such account.
Remediation
Install update from vendor's website.