6.5

CVE-2024-10270

A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
Package keycloak
Default Statusunaffected
Version < 24.0.9
Version 0
Status affected
Version < 26.0.6
Version 25.0.0
Status affected
VendorRed Hat
Product Red Hat build of Keycloak 24
Default Statusaffected
Version < *
Version 24.0.9-1
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 24
Default Statusaffected
Version < *
Version 24-18
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 24
Default Statusaffected
Version < *
Version 24-18
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 24.0.9
Default Statusunaffected
VendorRed Hat
Product Red Hat build of Keycloak 26.0
Default Statusaffected
Version < *
Version 26.0.6-2
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 26.0
Default Statusaffected
Version < *
Version 26.0-5
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 26.0
Default Statusaffected
Version < *
Version 26.0-6
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 26.0.6
Default Statusunaffected
VendorRed Hat
Product Red Hat JBoss Enterprise Application Platform 8
Default Statusunaffected
VendorRed Hat
Product Red Hat JBoss Enterprise Application Platform Expansion Pack
Default Statusunaffected
VendorRed Hat
Product Red Hat Single Sign-On 7
Default Statusunknown
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.09% 0.261
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-1333 Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.