Vulnerability Name:

CVE-2020-10758 (CCN-188447)

Assigned:2020-06-04
Published:2020-06-04
Updated:2021-02-03
Summary:A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-770
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2020-10758

Source: CCN
Type: Red Hat Bugzilla – Bug 1843849
(CVE-2020-10758) - CVE-2020-10758 keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body

Source: MISC
Type: Issue Tracking, Mitigation, Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1843849

Source: XF
Type: UNKNOWN
keycloak-cve202010758-dos(188447)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251

Source: CCN
Type: Keycloak Web site
Keycloak

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:keycloak:*:*:*:*:*:*:*:* (Version < 11.0.1)
  • OR cpe:/a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*
  • OR cpe:/a:redhat:openshift_application_runtimes:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
  • OR cpe:/a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:single_sign-on:7.4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:redhat:keycloak:3.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:2.5.0:-:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:4.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:keycloak:8.0.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    redhat keycloak *
    redhat openshift application runtimes -
    redhat openshift application runtimes 1.0
    redhat single sign-on -
    redhat single sign-on 7.0
    redhat single sign-on 7.4
    redhat keycloak 3.4.3
    redhat keycloak 2.5.4
    redhat keycloak 2.5.0
    redhat keycloak 4.0.0 beta2
    redhat keycloak 4.3.0
    redhat keycloak 4.2.1
    redhat keycloak 3.2.1
    redhat keycloak 6.0.0
    redhat keycloak 8.0.0
    redhat keycloak 10.0.0
    redhat keycloak 9.0.0
    redhat keycloak 8.0.2