Keycloak: offline session token dos
CVE-2023-6563

7.7HIGH

Summary

A memory consumption issue has been identified in Keycloak that can significantly impact performance in environments managing millions of offline tokens. This vulnerability can be exploited when an attacker opens the 'consents' tab in the admin User Interface after creating multiple user sessions. The UI's attempt to load extensive offline client sessions leads to excessive CPU and memory use, risking potential crashes of the system.

Affected Version(s)

Red Hat Single Sign-On 7.6 for RHEL 7 0:18.0.11-2.redhat_00003.1.el7sso

Red Hat Single Sign-On 7.6 for RHEL 8 0:18.0.11-2.redhat_00003.1.el8sso

Red Hat Single Sign-On 7.6 for RHEL 9 0:18.0.11-2.redhat_00003.1.el9sso

References

CVSS V3.1

Score:
7.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.