Description
It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0629 | It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks. |
Github GHSA |
GHSA-jc6q-27mw-p55w | Keycloak vulnerable to infinite loop based Denial of Service |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T14:02:07.264Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2646
No data.
Status : Modified
Published: 2018-07-27T18:29:01.017
Modified: 2024-11-21T03:23:54.090
Link: CVE-2017-2646
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA