Session Replacement Flaw in Keycloak by Red Hat
CVE-2018-10912
4.4MEDIUM
What is CVE-2018-10912?
Keycloak, an open-source Identity and Access Management solution by Red Hat, contains a vulnerability in session replacement prior to version 4.0.0.final. This issue arises in a clustered environment where an expired session can lead to an infinite loop due to improper handling. Malicious authenticated users are able to exploit this flaw, potentially resulting in a Denial of Service situation for the server, affecting overall functionality and accessibility.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
keycloak Keycloak 4.0.0.Final
References
CVSS V3.1
Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
