Lucene search

K
githubGitHub Advisory DatabaseGHSA-GC7Q-JGJV-VJR2
HistorySep 17, 2024 - 10:29 p.m.

Keycloak Services has a potential bypass of brute force protection

2024-09-1722:29:01
CWE-307
CWE-837
GitHub Advisory Database
github.com
keycloak
brute force protection
bypass
parallel login
security issue
acknowledgements
maurizio agazzini
project improvement
software

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.8

Confidence

Low

If an attacker launches many login attempts in parallel then the attacker can have more guesses at a password than the brute force protection configuration permits. This is due to the brute force check occurring before the brute force protector has locked the user.

Acknowledgements:
Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
VendorProductVersionCPE
org.keycloak\keycloakservicescpe:2.3:a:org.keycloak\:keycloak:services:*:*:*:*:*:*:*:*

References

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.8

Confidence

Low