Allocation of Resources Without Limits or Throttling Affecting rh-sso7-keycloak-server package, versions <0:18.0.12-1.redhat_00001.1.el7sso


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.27% (68th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL7-RHSSO7KEYCLOAKSERVER-6247191
  • published14 Feb 2024
  • disclosed18 Apr 2023

Introduced: 18 Apr 2023

CVE-2023-26048  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade RHEL:7 rh-sso7-keycloak-server to version 0:18.0.12-1.redhat_00001.1.el7sso or higher.
This issue was patched in RHSA-2024:0798.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rh-sso7-keycloak-server package and not the rh-sso7-keycloak-server package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with @MultipartConfig) that call HttpServletRequest.getParameter() or HttpServletRequest.getParts() may cause OutOfMemoryError when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of fileSizeThreshold=0 which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw OutOfMemoryError. However, the server may be able to recover after the OutOfMemoryError and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter maxRequestSize which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).

CVSS Scores

version 3.1