From dcccfe01ced8b0e5f0ecc064c00f414994f89376 Mon Sep 17 00:00:00 2001 From: sampion88 Date: Thu, 5 Mar 2026 11:07:17 +0100 Subject: [PATCH] new vulnerability in keycloak-services --- input/new.json | 36 +++++++++++++++++++++++------------- 1 file changed, 23 insertions(+), 13 deletions(-) diff --git a/input/new.json b/input/new.json index 87646b9a..0b85aee8 100644 --- a/input/new.json +++ b/input/new.json @@ -1,15 +1,25 @@ { - "package_name": "", - "patch_versions": [], - "vulnerable_ranges": [], - "cwe": [], - "tldr": "", - "doest_this_affect_me": "", - "how_to_fix": "", - "vulnerable_to": "", - "related_cve_id": "", - "language": "", - "severity_class": "", - "aikido_score": 0, - "changelog": "" + "package_name": "keycloak-services", + "org_name": "org.keycloak", + "patch_versions": [ + "26.5.4" + ], + "vulnerable_ranges": [ + [ + "0.0.1", + "26.5.3" + ] + ], + "cwe": [ + "CWE-400" + ], + "tldr": "Affected versions of this package are vulnerable to a Denial of Service (DoS). The application does not enforce size limits when decompressing `SAMLRequest` messages received via the SAML Redirect Binding. An unauthenticated remote attacker can send a highly compressed request that expands significantly during DEFLATE decompression, potentially causing excessive memory consumption and triggering an `OutOfMemoryError`, leading to process termination.", + "doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.", + "how_to_fix": "Upgrade the `org.keycloak:keycloak-services` library to a patch version.", + "vulnerable_to": "Denial of Service (DoS)", + "related_cve_id": "CVE-2026-2575", + "language": "java", + "severity_class": "MEDIUM", + "aikido_score": 50, + "changelog": "https://github.com/keycloak/keycloak/releases/tag/26.5.4" }