{"uuid": "5049ec1d-6506-4b80-b33d-67a8e4dfbe37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "RHSA-2024:1860", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8934", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1249\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in Keycloak's OIDC component in the \"checkLoginIframe,\" which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.\n\ud83d\udccf Published: 2024-04-17T13:22:48.335Z\n\ud83d\udccf Modified: 2025-03-26T19:24:12.590Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:1860\n2. https://access.redhat.com/errata/RHSA-2024:1861\n3. https://access.redhat.com/errata/RHSA-2024:1862\n4. https://access.redhat.com/errata/RHSA-2024:1864\n5. https://access.redhat.com/errata/RHSA-2024:1866\n6. https://access.redhat.com/errata/RHSA-2024:1867\n7. https://access.redhat.com/errata/RHSA-2024:1868\n8. https://access.redhat.com/errata/RHSA-2024:2945\n9. https://access.redhat.com/errata/RHSA-2024:4057\n10. https://access.redhat.com/security/cve/CVE-2024-1249\n11. https://bugzilla.redhat.com/show_bug.cgi?id=2262918", "creation_timestamp": "2025-03-26T19:26:07.000000Z"}