logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-6563

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-6563

Description:
An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
Last updated date:
12/27/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
12/27/2023
Reference url to background

https://access.redhat.com/errata/RHSA-2023:7857

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy