CVE-2017-2646 – org.keycloak:keycloak-core
Package
Manager: maven
Name: org.keycloak:keycloak-core
Vulnerable Version: >=0 <2.5.5
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00503 pctl0.65079
Details
Keycloak vulnerable to infinite loop based Denial of Service When Keycloak versions prior to 2.5.5 receive a Logout request with an Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in an infinite loop. An attacker could use this flaw to conduct denial of service attacks.
Metadata
Created: 2018-10-18T16:49:29Z
Modified: 2022-09-13T23:31:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-jc6q-27mw-p55w/GHSA-jc6q-27mw-p55w.json
CWE IDs: ["CWE-835"]
Alternative ID: GHSA-jc6q-27mw-p55w
Finding: F138
Auto approve: 1