Session Replacement Flaw in Keycloak by Red Hat
CVE-2018-10912

4.4MEDIUM

Key Information:

Vendor

[unknown]

Status
Vendor
CVE Published:
23 July 2018

What is CVE-2018-10912?

Keycloak, an open-source Identity and Access Management solution by Red Hat, contains a vulnerability in session replacement prior to version 4.0.0.final. This issue arises in a clustered environment where an expired session can lead to an infinite loop due to improper handling. Malicious authenticated users are able to exploit this flaw, potentially resulting in a Denial of Service situation for the server, affecting overall functionality and accessibility.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

keycloak Keycloak 4.0.0.Final

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.