Lucene search

K
redhatcveRedhat.comRH:CVE-2020-10758
HistoryAug 18, 2020 - 7:29 p.m.

CVE-2020-10758

2020-08-1819:29:48
redhat.com
access.redhat.com
12

0.001 Low

EPSS

Percentile

40.9%

A flaw was found in Keycloak. This flaw allows an attacker to perform a denial of service attack by sending multiple simultaneous requests with a Content-Length header value greater than the actual byte count of the request body. The highest threat from this vulnerability is to system availability.

Mitigation

- The possibility of this issue largely depends on the environment, specifically the load balancer or reverse proxies between the client and the server. The issue occurs when there is no load balancer in place.

- Proper tuning of HTTP request timeout and keycloak database max pool size can mitigate this issue :
bin/jboss-cli.sh --connect --commands='/subsystem=transactions:write-attribute(name=default-timeout,value=30),/subsystem=undertow/server=default-server/http-listener=default/:write-attribute(name=read-timeout,value=30000),/subsystem=undertow/server=default-server/https-listener=https/:write-attribute(name=read-timeout,value=30000),/subsystem=datasources/data-source=KeycloakDS/:write-attribute(name=max-pool-size,value=100),reload'

0.001 Low

EPSS

Percentile

40.9%