You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Keycloak Services has a potential bypass of brute force protection
Moderate severity
GitHub Reviewed
Published
Sep 17, 2024
in
keycloak/keycloak
If an attacker launches many login attempts in parallel then the attacker can have more guesses at a password than the brute force protection configuration permits. This is due to the brute force check occurring before the brute force protector has locked the user.
Acknowledgements:
Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project.
If an attacker launches many login attempts in parallel then the attacker can have more guesses at a password than the brute force protection configuration permits. This is due to the brute force check occurring before the brute force protector has locked the user.
Acknowledgements:
Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project.
References