Bug 2319217 (CVE-2024-10039) - CVE-2024-10039 keycloak-core: mTLS passthrough
Summary: CVE-2024-10039 keycloak-core: mTLS passthrough
Keywords:
Status: NEW
Alias: CVE-2024-10039
Deadline: 2024-11-21
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-16 15:44 UTC by OSIDB Bzimport
Modified: 2025-11-11 08:27 UTC (History)
81 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:10175 0 None None None 2024-11-21 19:23:36 UTC
Red Hat Product Errata RHSA-2024:10176 0 None None None 2024-11-21 19:23:55 UTC
Red Hat Product Errata RHSA-2024:10177 0 None None None 2024-11-21 19:24:42 UTC
Red Hat Product Errata RHSA-2024:10178 0 None None None 2024-11-21 19:24:52 UTC

Description OSIDB Bzimport 2024-10-16 15:44:58 UTC
Deployments of Keycloak with a reverse proxy not using pass-through
termination of TLS, with mTLS enabled, are affected by an issue where an
attacker on the local network can authenticate as any user or client that
leverages mTLS as the authentication mechanism.

Trusted proxies introduced in Keycloak 26 can mitigate this to some extent
by only accepting certificates from proxy headers if the request is coming
from the IP address of the proxy. However, this is a very weak form of authentication as IP addresses can in many cases be spoofed.

The attacker would need to have access to the local network, and in
addition gain access to the corresponding public certificates, which in
many cases is not the hardest thing to do, especially considering that we
are assuming an insider, or an attacker that has gained access to the local
network.

Additionally, Keycloak can further be configured to not only obtain
certificates through HTTP headers, but also to not validate the
certificates. If this option is enabled for a deployment the attacker does
not have to obtain the actual public certificate, and can simply generate a
random one with for example openssl with whatever subject they want.

Comment 2 errata-xmlrpc 2024-11-21 19:23:31 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 24

Via RHSA-2024:10175 https://access.redhat.com/errata/RHSA-2024:10175

Comment 3 errata-xmlrpc 2024-11-21 19:23:50 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 24.0.9

Via RHSA-2024:10176 https://access.redhat.com/errata/RHSA-2024:10176

Comment 4 errata-xmlrpc 2024-11-21 19:24:37 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 26.0

Via RHSA-2024:10177 https://access.redhat.com/errata/RHSA-2024:10177

Comment 5 errata-xmlrpc 2024-11-21 19:24:48 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 26.0.6

Via RHSA-2024:10178 https://access.redhat.com/errata/RHSA-2024:10178

Comment 6 Chess Hazlett 2024-11-27 21:00:09 UTC
commit: https://github.com/keycloak/keycloak/pull/35222/files


Note You need to log in before you can comment on or make changes to this bug.