First published: Tue Nov 26 2024(Updated: )
A potential Denial of Service (DoS) vulnerability has been identified in Keycloak, which could allow an administrative user with the rights to change realm settings to disrupt the service. This is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that is already terminated, leading to a failure of said request. Service disruption may happen, users will be unable to access applications relying on Keycloak, or any of the consoles provided by Keycloak itself on the affected realm.
Affected Software | Affected Version | How to fix |
---|---|---|
Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2328846 is considered critical due to its potential for Denial of Service.
To fix REDHAT-BUG-2328846, administrators should update to the latest version of Red Hat Build of Keycloak that addresses this vulnerability.
REDHAT-BUG-2328846 affects administrative users of Red Hat Build of Keycloak who have permissions to change realm settings.
The vulnerability in REDHAT-BUG-2328846 is caused by the ability to modify security headers and insert newlines, leading to a service disruption.
Currently, there are no known workarounds for REDHAT-BUG-2328846; the best action is to apply the recommended updates.