Allocation of Resources Without Limits or Throttling Affecting org.keycloak:keycloak-model-jpa package, versions [,21.0.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGKEYCLOAK-6128851
  • published15 Dec 2023
  • disclosed14 Dec 2023
  • creditchehrhar

Introduced: 14 Dec 2023

CVE-2023-6563  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade org.keycloak:keycloak-model-jpa to version 21.0.0 or higher.

Overview

org.keycloak:keycloak-model-jpa is an Identity and Access Management module for Keycloak JPA.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to an unconstrained memory consumption issue when the consents tab of the admin User Interface is accessed. An attacker can cause excessive memory and CPU consumption, potentially crashing the system by creating multiple user sessions and opening the consents tab, which attempts to load a large number of offline client sessions.

Note:

This is only exploitable if the environment has millions of offline tokens (more than 500,000 users with each having at least 2 saved sessions).

Workaround

This vulnerability can be mitigated by blocking the consents URL if using a reverse proxy, removing the consents application tab from the account console theme, or entirely disabling offline user profiles.

CVSS Scores

version 3.1