Vulnerability Details CVE-2017-2646
It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.7%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2017-2646
-
cpe:2.3:a:redhat:keycloak:-
-
cpe:2.3:a:redhat:keycloak:1.0
-
cpe:2.3:a:redhat:keycloak:1.0.0
-
cpe:2.3:a:redhat:keycloak:1.0.1
-
cpe:2.3:a:redhat:keycloak:1.0.2
-
cpe:2.3:a:redhat:keycloak:1.0.3
-
cpe:2.3:a:redhat:keycloak:1.0.4
-
cpe:2.3:a:redhat:keycloak:1.0.5
-
cpe:2.3:a:redhat:keycloak:1.1.0
-
cpe:2.3:a:redhat:keycloak:1.1.1
-
cpe:2.3:a:redhat:keycloak:1.2.0
-
cpe:2.3:a:redhat:keycloak:1.3.0
-
cpe:2.3:a:redhat:keycloak:1.3.1
-
cpe:2.3:a:redhat:keycloak:1.4.0
-
cpe:2.3:a:redhat:keycloak:1.5.0
-
cpe:2.3:a:redhat:keycloak:1.5.1
-
cpe:2.3:a:redhat:keycloak:1.6.0
-
cpe:2.3:a:redhat:keycloak:1.6.1
-
cpe:2.3:a:redhat:keycloak:1.7.0
-
cpe:2.3:a:redhat:keycloak:1.8.0
-
cpe:2.3:a:redhat:keycloak:1.8.1
-
cpe:2.3:a:redhat:keycloak:1.8.2
-
cpe:2.3:a:redhat:keycloak:1.9.0
-
cpe:2.3:a:redhat:keycloak:1.9.1
-
cpe:2.3:a:redhat:keycloak:1.9.2
-
cpe:2.3:a:redhat:keycloak:1.9.3
-
cpe:2.3:a:redhat:keycloak:1.9.4
-
cpe:2.3:a:redhat:keycloak:1.9.5
-
cpe:2.3:a:redhat:keycloak:1.9.6
-
cpe:2.3:a:redhat:keycloak:1.9.7
-
cpe:2.3:a:redhat:keycloak:1.9.8
-
cpe:2.3:a:redhat:keycloak:2.0.0
-
cpe:2.3:a:redhat:keycloak:2.1.0
-
cpe:2.3:a:redhat:keycloak:2.2.0
-
cpe:2.3:a:redhat:keycloak:2.2.1
-
cpe:2.3:a:redhat:keycloak:2.3.0
-
cpe:2.3:a:redhat:keycloak:2.4.0
-
cpe:2.3:a:redhat:keycloak:2.5.0
-
cpe:2.3:a:redhat:keycloak:2.5.1
-
cpe:2.3:a:redhat:keycloak:2.5.2
-
cpe:2.3:a:redhat:keycloak:2.5.3
-
cpe:2.3:a:redhat:keycloak:2.5.4