Description
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0613 | keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server. |
Github GHSA |
GHSA-h7j7-pw3v-3v3x | Moderate severity vulnerability that affects org.keycloak:keycloak-core |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T07:54:36.292Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-10912
No data.
Status : Modified
Published: 2018-07-23T22:29:00.207
Modified: 2024-11-21T03:42:17.180
Link: CVE-2018-10912
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA