Headline
GHSA-pcx7-8hxg-j823: Duplicate Advisory: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jgwc-jh89-rpgq. This link is maintained to preserve external references.
Original Description
A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-pcx7-8hxg-j823
Duplicate Advisory: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability
Moderate severity GitHub Reviewed Published Nov 25, 2024 to the GitHub Advisory Database • Updated Nov 25, 2024
Withdrawn This advisory was withdrawn on Nov 25, 2024
Package
maven org.keycloak:keycloak-quarkus-server (Maven)
Affected versions
< 24.0.9
>= 25.0.0, < 26.0.6
Patched versions
24.0.9
26.0.6
Published by the National Vulnerability Database
Nov 25, 2024
Published to the GitHub Advisory Database
Nov 25, 2024
Last updated
Nov 25, 2024