Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-4629

Опубликовано: 03 сент. 2024
Источник: redhat
CVSS3: 6.5

Описание

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.

Отчет

This vulnerability is classified as low severity due to its potential impact on account security in Keycloak environments. By exploiting the timing between login attempts and the application of brute force protection, attackers can circumvent lockout mechanisms intended to prevent multiple failed authentication attempts. This allows attackers to increase the number of guesses they can make within the authentication system, potentially leading to unauthorized access to user accounts. Red Hat has evaluated this vulnerability and it only affects the Red Hat Single Sign-On (RHSSO) and Red Hat Build of Keycloak (RHBK).

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentNot affected
Red Hat Build of Keycloakorg.keycloak-keycloak-parentFixedRHSA-2024:650109.09.2024
Red Hat build of Keycloak 22rhbk/keycloak-operator-bundleFixedRHSA-2024:650009.09.2024
Red Hat build of Keycloak 22rhbk/keycloak-rhel9FixedRHSA-2024:650009.09.2024
Red Hat build of Keycloak 22rhbk/keycloak-rhel9-operatorFixedRHSA-2024:650009.09.2024
Red Hat Single Sign-On 7org.keycloak-keycloak-parentFixedRHSA-2024:649909.09.2024
Red Hat Single Sign-On 7.6 for RHEL 7rh-sso7-keycloakFixedRHSA-2024:649309.09.2024
Red Hat Single Sign-On 7.6 for RHEL 8rh-sso7-keycloakFixedRHSA-2024:649409.09.2024
Red Hat Single Sign-On 7.6 for RHEL 9rh-sso7-keycloakFixedRHSA-2024:649509.09.2024
RHEL-8 based Middleware Containersrh-sso-7/sso76-openshift-rhel8FixedRHSA-2024:649709.09.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-837
https://bugzilla.redhat.com/show_bug.cgi?id=2276761keycloak: potential bypass of brute force protection

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 1 года назад

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.

CVSS3: 6.5
debian
больше 1 года назад

A vulnerability was found in Keycloak. This flaw allows attackers to b ...

CVSS3: 6.5
github
больше 1 года назад

Keycloak Services has a potential bypass of brute force protection

6.5 Medium

CVSS3