GHSA-r32r-3977-cgc3

Suggest an improvement
Source
https://github.com/advisories/GHSA-r32r-3977-cgc3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-r32r-3977-cgc3/GHSA-r32r-3977-cgc3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r32r-3977-cgc3
Aliases
  • CVE-2014-3651
Published
2018-10-18T16:50:20Z
Modified
2023-11-08T03:57:40.064009Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Keycloak vulnerable to uncontrolled resource consumption
Details

JBoss KeyCloak versions prior to 1.0.3.Final allow remote attackers to create a denial of service (resource consumption) by supplying a large value in the size parameter to auth/qrcode, related to QR code generation.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-06-16T21:53:24Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Maven / org.keycloak:keycloak-core

Package

Name
org.keycloak:keycloak-core
View open source insights on deps.dev
Purl
pkg:maven/org.keycloak/keycloak-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.3

Affected versions

1.*

1.0-alpha-1
1.0-alpha-1-12062013
1.0-alpha-2
1.0-alpha-3
1.0-alpha-4
1.0-beta-1
1.0-beta-1-20150521
1.0-beta-1-20150523
1.0-beta-2
1.0-beta-3
1.0-beta-4
1.0-rc-1
1.0-rc-2
1.0-final
1.0.1.Final
1.0.2.Final