6.5
CVE-2024-10270
- EPSS 0.09%
- Published 25.11.2024 08:15:03
- Last modified 25.11.2024 08:15:03
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
≫
Package
keycloak
Default Statusunaffected
Version <
24.0.9
Version
0
Status
affected
Version <
26.0.6
Version
25.0.0
Status
affected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 24
Default Statusaffected
Version <
*
Version
24.0.9-1
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 24
Default Statusaffected
Version <
*
Version
24-18
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 24
Default Statusaffected
Version <
*
Version
24-18
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 24.0.9
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0
Default Statusaffected
Version <
*
Version
26.0.6-2
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0
Default Statusaffected
Version <
*
Version
26.0-5
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0
Default Statusaffected
Version <
*
Version
26.0-6
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0.6
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat JBoss Enterprise Application Platform 8
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat JBoss Enterprise Application Platform Expansion Pack
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Single Sign-On 7
Default Statusunknown
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.09% | 0.261 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-1333 Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.