Duplicate Advisory: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability
Moderate severity
GitHub Reviewed
Published
Nov 25, 2024
to the GitHub Advisory Database
•
Updated Nov 25, 2024
Withdrawn
This advisory was withdrawn on Nov 25, 2024
Package
Affected versions
< 24.0.9
>= 25.0.0, < 26.0.6
Patched versions
24.0.9
26.0.6
Description
Published by the National Vulnerability Database
Nov 25, 2024
Published to the GitHub Advisory Database
Nov 25, 2024
Reviewed
Nov 25, 2024
Withdrawn
Nov 25, 2024
Last updated
Nov 25, 2024
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jgwc-jh89-rpgq. This link is maintained to preserve external references.
Original Description
A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service.
The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.
References