Description
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0613 | keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server. |
Github GHSA |
GHSA-h7j7-pw3v-3v3x | Moderate severity vulnerability that affects org.keycloak:keycloak-core |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T07:54:36.292Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-10912
No data.
Status : Modified
Published: 2018-07-23T22:29:00.207
Modified: 2024-11-21T03:42:17.180
Link: CVE-2018-10912
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA