Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-model-jpa
  4. ›
  5. CVE-2023-6563

CVE-2023-6563: Allocation of Resources Without Limits or Throttling

December 14, 2023 (updated December 27, 2023)

An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the “consents” tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.

References

  • access.redhat.com/errata/RHSA-2023:7854
  • access.redhat.com/errata/RHSA-2023:7855
  • access.redhat.com/errata/RHSA-2023:7856
  • access.redhat.com/errata/RHSA-2023:7857
  • access.redhat.com/errata/RHSA-2023:7858
  • access.redhat.com/security/cve/CVE-2023-6563
  • bugzilla.redhat.com/show_bug.cgi?id=2253308
  • github.com/advisories/GHSA-54f3-c6hg-865h
  • github.com/keycloak/keycloak/commit/556146f961f7c8ddf64de15e2117a58d045f72b5
  • github.com/keycloak/keycloak/issues/13340
  • github.com/keycloak/keycloak/pull/15463
  • nvd.nist.gov/vuln/detail/CVE-2023-6563

Code Behaviors & Features

Detect and mitigate CVE-2023-6563 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 21.0.0

Fixed versions

  • 21.0.0

Solution

Upgrade to version 21.0.0 or above.

Impact 7.7 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

maven/org.keycloak/keycloak-model-jpa/CVE-2023-6563.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:58 +0000.