Allocation of Resources Without Limits in Keycloak
High severity
GitHub Reviewed
Published
Dec 14, 2023
to the GitHub Advisory Database
•
Updated Dec 29, 2023
Description
Published by the National Vulnerability Database
Dec 14, 2023
Published to the GitHub Advisory Database
Dec 14, 2023
Reviewed
Dec 15, 2023
Last updated
Dec 29, 2023
An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
References