Lucene search

K
osvGoogleOSV:GHSA-GC7Q-JGJV-VJR2
HistorySep 17, 2024 - 10:29 p.m.

Keycloak Services has a potential bypass of brute force protection

2024-09-1722:29:01
Google
osv.dev
keycloak
services
brute force protection
bypass
attacker
login attempts
parallel
password
configuration
brute force check
brute force protector

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.7

Confidence

High

If an attacker launches many login attempts in parallel then the attacker can have more guesses at a password than the brute force protection configuration permits. This is due to the brute force check occurring before the brute force protector has locked the user.

Acknowledgements:
Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project.

References

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.7

Confidence

High