
We found results for “”
CVE-2024-11734
Good to know:


Date: January 14, 2025
A denial of service vulnerability was found in Keycloak that could allow an administrative user with the right to change realm settings to disrupt the service. This action is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that has already been terminated, leading to the failure of said request.
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Protection Mechanism Failure
CWE-693Top Fix

Upgrade Version
Upgrade to version org.keycloak:keycloak-server-spi-private:26.0.8;org.keycloak:keycloak-server-spi-private:26.0.8;org.keycloak:keycloak-server-spi-private:26.0.8;org.keycloak:keycloak-services:1.5.0-Final;org.keycloak:keycloak-services:26.0.8;org.keycloak:keycloak-services:26.0.8;org.keycloak:keycloak-services:26.0.8;org.jboss.aerogear.unifiedpush:unifiedpush-auth-server:1.0.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |