CVE-2024-10270: org.keycloak:keycloak-services has Inefficient Regular Expression Complexity
A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.
References
- access.redhat.com/errata/RHSA-2024:10175
- access.redhat.com/errata/RHSA-2024:10176
- access.redhat.com/errata/RHSA-2024:10177
- access.redhat.com/errata/RHSA-2024:10178
- access.redhat.com/security/cve/CVE-2024-10270
- bugzilla.redhat.com/show_bug.cgi?id=2321214
- github.com/advisories/GHSA-wq8x-cg39-8mrr
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/commit/5d6c91f3309db468b0fe4834e88c3d25649f73e4
- github.com/keycloak/keycloak/security/advisories/GHSA-wq8x-cg39-8mrr
- nvd.nist.gov/vuln/detail/CVE-2024-10270
Detect and mitigate CVE-2024-10270 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →