Description
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
Remediation
References
https://access.redhat.com/errata/RHSA-2018:2428
https://access.redhat.com/errata/RHSA-2019:0877
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10912
Related Vulnerabilities
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-shuffle_2.11
CVE-2018-1999047 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2019-1003032 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2020-17480 Vulnerability in npm package tinymce
CVE-2017-1000391 Vulnerability in maven package org.jenkins-ci.main:jenkins-core