Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2024-6887-03

Red Hat Security Advisory 2024-6887-03 - New images with security impact Important are available for Red Hat build of Keycloak 22.0.13 and Red Hat build of Keycloak 22.0.13 Operator, running on OpenShift Container Platform. Issues addressed include a privilege escalation vulnerability.

Packet Storm
#vulnerability#web#red_hat#js#auth
The following advisory data is extracted from:https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_6887.jsonRed Hat officially shut down their mailing list notifications October 10, 2023.  Due to this, Packet Storm has recreated the below data as a reference point to raise awareness.  It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.- Packet Storm Staff====================================================================Red Hat Security AdvisorySynopsis:           Important: Red Hat build of Keycloak 22.0.13 Images UpdateAdvisory ID:        RHSA-2024:6887-03Product:            Red Hat build of KeycloakAdvisory URL:       https://access.redhat.com/errata/RHSA-2024:6887Issue date:         2024-09-19Revision:           03CVE Names:          CVE-2024-8698====================================================================Summary: New images with security impact Important are available for Red Hat build of Keycloak 22.0.13 and Red Hat build of Keycloak 22.0.13 Operator, running on OpenShift Container PlatformDescription:Red Hat build of Keycloak is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat build of Keycloak for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services.Red Hat build of Keycloak Operator for OpenShift simplifies deployment and management of Keycloak 22.0.13 clusters.This erratum releases new images for Red Hat build of Keycloak 22.0.13 for use within the OpenShift Container Platform cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments, aligning with the standalone product release.Security fixes:* Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak (CVE-2024-8698)* Vulnerable Redirect URI Validation Results in Open Redirec (CVE-2024-8883)Solution:CVEs:CVE-2024-8698References:https://access.redhat.com/security/updates/classification/#importanthttps://bugzilla.redhat.com/show_bug.cgi?id=2311641https://bugzilla.redhat.com/show_bug.cgi?id=2312511

Related news

Red Hat Security Advisory 2024-6890-03

Red Hat Security Advisory 2024-6890-03 - New Red Hat build of Keycloak 24.0.8 packages with security impact Important are available from the Customer Portal. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6890-03

Red Hat Security Advisory 2024-6890-03 - New Red Hat build of Keycloak 24.0.8 packages with security impact Important are available from the Customer Portal. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6889-03

Red Hat Security Advisory 2024-6889-03 - New images with security impact Important are available for Red Hat build of Keycloak 24.0.8 and Red Hat build of Keycloak 24.0.8 Operator, running on OpenShift Container Platform. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6889-03

Red Hat Security Advisory 2024-6889-03 - New images with security impact Important are available for Red Hat build of Keycloak 24.0.8 and Red Hat build of Keycloak 24.0.8 Operator, running on OpenShift Container Platform. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6888-03

Red Hat Security Advisory 2024-6888-03 - New Red Hat build of Keycloak 22.0.13 packages with security impact Important are available from the Customer Portal. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6888-03

Red Hat Security Advisory 2024-6888-03 - New Red Hat build of Keycloak 22.0.13 packages with security impact Important are available from the Customer Portal. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6886-03

Red Hat Security Advisory 2024-6886-03 - A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6882-03

Red Hat Security Advisory 2024-6882-03 - A new image is available for Red Hat Single Sign-On 7.6.11, running on OpenShift Container Platform 3.10 and 3.11, and 4.3. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6880-03

Red Hat Security Advisory 2024-6880-03 - New Red Hat Single Sign-On 7.6.11 packages are now available for Red Hat Enterprise Linux 9. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6879-03

Red Hat Security Advisory 2024-6879-03 - New Red Hat Single Sign-On 7.6.11 packages are now available for Red Hat Enterprise Linux 8. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2024-6878-03

Red Hat Security Advisory 2024-6878-03 - New Red Hat Single Sign-On 7.6.11 packages are now available for Red Hat Enterprise Linux 7. Issues addressed include a privilege escalation vulnerability.

GHSA-4xx7-2cx3-x473: Keycloak SAML signature validation flaw

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

GHSA-vvf8-2h68-9475: Keycloak Open Redirect vulnerability

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution