Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9666: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

0
Medium
VulnerabilityCVE-2024-9666cvecve-2024-9666
Published: Mon Nov 25 2024 (11/25/2024, 07:29:52 UTC)
Source: CVE Database V5

Description

A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.

AI-Powered Analysis

AILast updated: 02/27/2026, 17:17:48 UTC

Technical Analysis

CVE-2024-9666 is a denial of service vulnerability affecting Keycloak Server versions up to 25.0.0. The issue arises from inconsistent interpretation and improper validation of proxy headers when Keycloak is configured to accept and trust these headers, typically in environments behind reverse proxies. Specifically, Keycloak may accept non-IP values in proxy headers, such as obfuscated or malformed identifiers, without proper validation. This leads to costly DNS resolution attempts for these invalid values. An attacker can exploit this by sending specially crafted HTTP requests containing such proxy headers, causing the server to perform excessive DNS lookups. This behavior ties up IO threads and resources, resulting in denial of service conditions. The vulnerability requires that the attacker has network access to send requests to the Keycloak instance and that the reverse proxy does not overwrite incoming headers, allowing malicious headers to reach Keycloak. The vulnerability does not impact confidentiality or integrity but affects availability. The CVSS 3.1 score of 4.7 reflects a local attack vector with high attack complexity and low privileges, no user interaction, and an impact limited to availability. No public exploits have been reported yet. This vulnerability highlights the risks of trusting proxy headers without strict validation and the importance of secure proxy configurations in identity management systems.

Potential Impact

The primary impact of CVE-2024-9666 is denial of service, which can disrupt authentication and authorization services provided by Keycloak. Organizations relying on Keycloak for identity and access management may experience service outages or degraded performance, affecting user access to critical applications and services. This can lead to operational disruptions, loss of productivity, and potential cascading effects on dependent systems. Since Keycloak is widely used in enterprise environments, cloud services, and open-source projects, the vulnerability could affect a broad range of organizations globally. The attack requires network access and specific proxy configurations, limiting the scope somewhat, but misconfigured environments are common. The denial of service could be leveraged as part of a larger attack chain or to cause targeted disruption against specific organizations. The lack of impact on confidentiality and integrity reduces risks of data breaches but availability impacts can still be severe for business continuity.

Mitigation Recommendations

To mitigate CVE-2024-9666, organizations should: 1) Review and harden proxy configurations to ensure that reverse proxies overwrite or sanitize incoming proxy headers before forwarding requests to Keycloak. 2) Disable trusting of proxy headers in Keycloak unless absolutely necessary, or restrict trusted proxies explicitly. 3) Implement strict validation of proxy headers to reject non-IP or malformed values before processing. 4) Monitor Keycloak server logs and network traffic for unusual DNS resolution patterns or spikes in IO thread usage indicative of exploitation attempts. 5) Apply any available patches or updates from Keycloak vendors as soon as they are released. 6) Consider deploying rate limiting or request filtering at the proxy or firewall level to reduce the risk of abuse. 7) Conduct regular security reviews of identity management infrastructure, especially when using reverse proxies and header forwarding. These steps go beyond generic advice by focusing on proxy header validation and infrastructure configuration, which are the root causes of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-08T22:36:23.598Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c4b66c7f7acdd3ea2e

Added to database: 10/4/2025, 10:15:32 AM

Last enriched: 2/27/2026, 5:17:48 PM

Last updated: 3/5/2026, 10:30:14 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses