CVE-2017-2646Infinite Loop in Redhat Keycloak

CWE-835Infinite Loop7 documents6 sources
Severity
7.5HIGHNVD
EPSS
0.5%
top 33.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 27
Latest updateOct 18

Description

It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDredhat/keycloak< 2.5.5
CVEListV5red_hat/keycloak2.5.5

🔴Vulnerability Details

3
OSV
Keycloak vulnerable to infinite loop based Denial of Service2018-10-18
GHSA
Keycloak vulnerable to infinite loop based Denial of Service2018-10-18
CVEList
CVE-2017-2646: It was found that when Keycloak before 22018-07-27

📋Vendor Advisories

1
Red Hat
keycloak: DoS via SAML request2017-03-10

💬Community

2
Bugzilla
CVE-2017-7599 libtiff: Unsigned short out of range in tif_dirwrite.c2017-04-11
Bugzilla
CVE-2017-2646 keycloak: DoS via SAML request2017-03-10
CVE-2017-2646 — Infinite Loop in Redhat Keycloak | cvebase