{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T12:25:22.491","vulnerabilities":[{"cve":{"id":"CVE-2024-8698","sourceIdentifier":"secalert@redhat.com","published":"2024-09-19T16:15:06.177","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks."},{"lang":"es","value":"Existe una falla en el método de validación de firma SAML dentro de la clase XMLSignatureUtil de Keycloak. El método determina incorrectamente si una firma SAML es para el documento completo o solo para afirmaciones específicas según la posición de la firma en el documento XML, en lugar del elemento Reference utilizado para especificar el elemento firmado. Esta falla permite a los atacantes crear respuestas manipuladas que pueden eludir la validación, lo que puede provocar ataques de suplantación o escalada de privilegios."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":5.3}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-347"}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2024:6878","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6879","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6880","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6882","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6886","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6887","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6888","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6889","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:6890","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:8823","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:8824","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:8826","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2024-8698","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2311641","source":"secalert@redhat.com"}]}}]}