First published: Tue Feb 06 2024(Updated: )
A potential security flaw in the "checkLoginIframe" which allows unvalidated cross-origin messages, enabling potential DDoS attacks. By exploiting this vulnerability, attackers could coordinate to send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages. Component affected: org.keycloak.protocol.oidc Version affected: <= 23.0.6
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Keycloak | <=23.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2262918 is considered high due to its potential to enable DDoS attacks.
To fix REDHAT-BUG-2262918, update to the latest version of Red Hat Build of Keycloak beyond version 23.0.6.
REDHAT-BUG-2262918 allows attackers to send a high volume of unvalidated requests, which could disrupt application availability.
Versions of Keycloak up to and including 23.0.6 are affected by REDHAT-BUG-2262918.
Currently, there are no specific workarounds for REDHAT-BUG-2262918; updating to a secure version is recommended.