Description
It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0629 | It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks. |
Github GHSA |
GHSA-jc6q-27mw-p55w | Keycloak vulnerable to infinite loop based Denial of Service |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T14:02:07.264Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2646
No data.
Status : Modified
Published: 2018-07-27T18:29:01.017
Modified: 2024-11-21T03:23:54.090
Link: CVE-2017-2646
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA