Resource exhaustion in JBoss Enterprise Application Platform and Keycloak - CVE-2016-8627

 

Resource exhaustion in JBoss Enterprise Application Platform and Keycloak - CVE-2016-8627

Published: May 11, 2018 / Updated: August 8, 2020


Vulnerability identifier: #VU37138
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-8627
CWE-ID: CWE-400
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Red Hat Inc.
Keycloak
Affected software:
JBoss Enterprise Application Platform
Keycloak

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.


How to mitigate CVE-2016-8627

Install update from vendor's website.

Sources