A potential security flaw in the "checkLoginIframe" which allows unvalidated cross-origin messages, enabling potential DDoS attacks. By exploiting this vulnerability, attackers could coordinate to send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages. Component affected: org.keycloak.protocol.oidc Version affected: <= 23.0.6
Update: Version affected: <= 23.0.6 Initially we received wrong versions in the original report. Updated in Comment 0 as well.
This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 7 Via RHSA-2024:1860 https://access.redhat.com/errata/RHSA-2024:1860
This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 8 Via RHSA-2024:1861 https://access.redhat.com/errata/RHSA-2024:1861
This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 9 Via RHSA-2024:1862 https://access.redhat.com/errata/RHSA-2024:1862
This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2024:1864 https://access.redhat.com/errata/RHSA-2024:1864
This issue has been addressed in the following products: RHSSO 7.6.8 Via RHSA-2024:1866 https://access.redhat.com/errata/RHSA-2024:1866
This issue has been addressed in the following products: Red Hat build of Keycloak 22.0.10 Via RHSA-2024:1868 https://access.redhat.com/errata/RHSA-2024:1868
This issue has been addressed in the following products: Red Hat build of Keycloak 22 Via RHSA-2024:1867 https://access.redhat.com/errata/RHSA-2024:1867