An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:build_keycloak: |
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2023-12-14T18:01:26.005Z
Updated: 2024-09-18T08:33:37.699Z
Reserved: 2023-12-06T18:47:35.594Z
Link: CVE-2023-6563
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2023-12-14T18:15:45.540
Modified: 2023-12-27T18:49:44.490
Link: CVE-2023-6563
Redhat