Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2050228 | issue tracking vendor advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt | third party advisory exploit |
https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076 | third party advisory exploit |