Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13M2c4LXI5Z3ctcXJoOM4ABDOw
Denial of Service in Keycloak Server via Security Headers
A potential Denial of Service (DoS) vulnerability has been identified in Keycloak, which could allow an administrative user with the rights to change realm settings to disrupt the service. This is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that is already terminated, leading to a failure of said request.
Service disruption may happen, users will be unable to access applications relying on Keycloak, or any of the consoles provided by Keycloak itself on the affected realm.
Permalink: https://github.com/advisories/GHSA-w3g8-r9gw-qrh8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13M2c4LXI5Z3ctcXJoOM4ABDOw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 2 days ago
Updated: about 21 hours ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-w3g8-r9gw-qrh8, CVE-2024-11734
References:
- https://github.com/keycloak/keycloak/security/advisories/GHSA-w3g8-r9gw-qrh8
- https://github.com/keycloak/keycloak/commit/93b2a7327b2557eb132a8169086c5e63c81dff79
- https://nvd.nist.gov/vuln/detail/CVE-2024-11734
- https://access.redhat.com/errata/RHSA-2025:0299
- https://access.redhat.com/errata/RHSA-2025:0300
- https://access.redhat.com/security/cve/CVE-2024-11734
- https://bugzilla.redhat.com/show_bug.cgi?id=2328846
- https://github.com/advisories/GHSA-w3g8-r9gw-qrh8
Blast Radius: 9.1
Affected Packages
maven:org.keycloak:keycloak-quarkus-server
Dependent packages: 5Dependent repositories: 25
Downloads:
Affected Version Ranges: < 26.0.8
Fixed in: 26.0.8
All affected versions: 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, 13.0.0, 13.0.1, 14.0.0, 15.0.0, 15.0.1, 15.0.2, 15.1.0, 15.1.1, 16.0.0, 16.1.0, 16.1.1, 17.0.0, 17.0.1, 18.0.0, 18.0.1, 18.0.2, 19.0.0, 19.0.1, 19.0.2, 19.0.3, 20.0.0, 20.0.1, 20.0.2, 20.0.3, 20.0.4, 20.0.5, 21.0.0, 21.0.1, 21.0.2, 21.1.0, 21.1.1, 21.1.2, 22.0.0, 22.0.1, 22.0.2, 22.0.3, 22.0.4, 22.0.5, 23.0.0, 23.0.1, 23.0.2, 23.0.3, 23.0.4, 23.0.5, 23.0.6, 23.0.7, 24.0.0, 24.0.1, 24.0.2, 24.0.3, 24.0.4, 24.0.5, 25.0.0, 25.0.1, 25.0.2, 25.0.3, 25.0.4, 25.0.5, 25.0.6, 26.0.0, 26.0.1, 26.0.2, 26.0.4, 26.0.5, 26.0.6, 26.0.7
All unaffected versions: