A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.
Workaround:
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:1860 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1861 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1862 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1864 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1866 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1867 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1868 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2945 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4057 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-1249 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2262918 | issue tracking |