First published: Mon Jul 23 2018(Updated: )
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Keycloak | <4.0.0. | 4.0.0. |
Red Hat Keycloak | <4.0.0 | |
redhat single sign-on | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10912 is rated as a high severity vulnerability due to its potential to cause Denial of Service in Keycloak environments.
To mitigate CVE-2018-10912, upgrade Keycloak to version 4.0.0 or later.
CVE-2018-10912 affects users of Keycloak versions prior to 4.0.0, particularly in clustered environments.
Exploiting CVE-2018-10912 can lead to an infinite loop situation causing Denial of Service for Keycloak instances.
Yes, a patch is available through the official upgrade to Keycloak version 4.0.0 and above.