Description
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
Remediation
References
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10912
https://access.redhat.com/errata/RHSA-2018:2428
https://access.redhat.com/errata/RHSA-2019:0877
Related Vulnerabilities
CVE-2020-2111 Vulnerability in maven package org.jenkins-ci.plugins:subversion
CVE-2020-14966 Vulnerability in maven package org.webjars.bower:jsrsasign
CVE-2023-30542 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2023-24423 Vulnerability in maven package com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger