
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability (CVE-2021-3461) was identified in Keycloak where the system may fail to properly logout user sessions when the logout request originates from an external SAML identity provider and the Principal Type is set to Attribute [Name]. This vulnerability affects Red Hat Single Sign-On 7.4 and Keycloak version 9.0.13 (Red Hat Advisory, NVD).
The vulnerability is classified as CWE-613 (Insufficient Session Expiration) with a CVSS v3.1 base score of 7.1 (HIGH). The vulnerability vector is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N. The issue specifically occurs in the keycloak-services jar within the SAMLEndpoint class (Red Hat Bugzilla).
When exploited, this vulnerability could lead to insufficient session expiration, potentially allowing unauthorized access to user sessions when specific SAML identity provider configurations are in place. The vulnerability affects the confidentiality and integrity of the system, though availability is not impacted (NVD).
Red Hat has addressed this vulnerability by releasing security updates for affected versions. The fix was included in Red Hat Single Sign-On 7.4.7 and Keycloak 9.0.13. Users are advised to upgrade to these versions or later (Red Hat Advisory).
The vulnerability was discovered and reported by Peter Mazán from TatraMed Software (Red Hat Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."