It was found that SAML authentication in Keycloak incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks.
Acknowledgments: Name: Benjamin Berg (Red Hat)
upstream patch: https://issues.jboss.org/secure/attachment/12439846/0001-KEYCLOAK-8163-Improve-SAML-validations.patch attached to jira: https://issues.jboss.org/browse/KEYCLOAK-8163
This issue has been addressed in the following products: Red Hat Single Sign-On 7.2 for RHEL 6 Via RHSA-2018:3592 https://access.redhat.com/errata/RHSA-2018:3592
This issue has been addressed in the following products: Red Hat Single Sign-On 7.2 for RHEL 7 Via RHSA-2018:3593 https://access.redhat.com/errata/RHSA-2018:3593
This issue has been addressed in the following products: Red Hat Single Sign-On 7.2.5 zip Via RHSA-2018:3595 https://access.redhat.com/errata/RHSA-2018:3595
This issue has been addressed in the following products: Red Hat Openshift Application Runtimes Via RHSA-2019:0877 https://access.redhat.com/errata/RHSA-2019:0877
This vulnerability is out of security support scope for the following product: * Red Hat Mobile Application Platform Please refer to https://access.redhat.com/support/policy/updates/rhmap for more details