rh-sso7-keycloak vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rh-sso7-keycloak package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Covert Timing Channel

*
  • L
Improper Input Validation

*
  • M
Inefficient Regular Expression Complexity

*
  • L
Overly Restrictive Account Lockout Mechanism

*
  • L
Cross-site Request Forgery (CSRF)

*
  • M
Improper Handling of Extra Values

*
  • M
Improper Authentication

*
  • L
Improper Input Validation

*
  • L
Improper Check for Dropped Privileges

*
  • M
Client-Side Enforcement of Server-Side Security

*
  • M
Improper Authentication

*
  • L
Information Exposure

*
  • M
Missing Authentication for Critical Function

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:18.0.19-1.redhat_00002.1.el8sso
  • H
Open Redirect

<0:18.0.18-1.redhat_00001.1.el8sso
  • H
Improper Verification of Cryptographic Signature

<0:18.0.18-1.redhat_00001.1.el8sso
  • M
Session Fixation

<0:18.0.16-1.redhat_00001.1.el8sso
  • M
Incorrect Default Permissions

<0:18.0.16-1.redhat_00001.1.el8sso
  • M
Improper Enforcement of a Single

<0:18.0.16-1.redhat_00001.1.el8sso
  • L
Cleartext Storage of Sensitive Information in a Cookie

<0:18.0.14-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Origin Validation Error

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Directory Traversal

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Permissive Regular Expression

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Improper Output Neutralization for Logs

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Information Exposure Through Log Files

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Files or Directories Accessible to External Parties

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Improper Validation of Syntactic Correctness of Input

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Allocation of Resources Without Limits or Throttling

<0:18.0.12-1.redhat_00001.1.el8sso
  • M
Improper Input Validation

<0:18.0.11-3.redhat_00001.1.el8sso
  • M
Open Redirect

<0:18.0.11-3.redhat_00001.1.el8sso
  • H
Allocation of Resources Without Limits or Throttling

<0:18.0.11-2.redhat_00003.1.el8sso
  • H
Open Redirect

<0:18.0.11-2.redhat_00003.1.el8sso
  • H
Arbitrary Code Injection

<0:18.0.11-2.redhat_00003.1.el8sso
  • H
Resource Exhaustion

<0:18.0.11-2.redhat_00001.1.el8sso
  • H
Information Exposure

<0:18.0.11-2.redhat_00001.1.el8sso
  • H
Improper Enforcement of Behavioral Workflow

<0:18.0.11-2.redhat_00001.1.el8sso
  • H
Uncontrolled Memory Allocation

<0:18.0.9-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Improperly Implemented Security Check for Standard

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Improper Certificate Validation

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.9-1.redhat_00001.1.el8sso
  • M
Information Exposure Through Server Error Message

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Uncontrolled Recursion

<0:18.0.9-1.redhat_00001.1.el8sso
  • H
Improper Certificate Validation

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
XML External Entity (XXE) Injection

<0:18.0.0-2.redhat_00001.1.el8sso
  • H
Incorrect Authorization

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Information Exposure

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Missing Authorization

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Authentication Bypass

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Improper Access Control

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Use of Hard-coded

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Information Exposure

<0:15.0.4-1.redhat_00003.1.el8sso
  • L
Cross-site Scripting (XSS)

<0:9.0.12-1.redhat_00001.1.el8sso
  • L
Authentication Bypass

<0:9.0.12-1.redhat_00001.1.el8sso
  • H
Incorrect Authorization

<0:15.0.4-1.redhat_00001.1.el8sso
  • H
Information Exposure

<0:15.0.4-1.redhat_00001.1.el8sso
  • H
Improper Authentication

<0:15.0.4-1.redhat_00001.1.el8sso
  • M
Insufficient Session Expiration

<0:9.0.13-1.redhat_00006.1.el8sso
  • M
Improper Authentication

<0:9.0.13-1.redhat_00006.1.el8sso
  • M
Allocation of Resources Without Limits or Throttling

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Improper Authentication

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Insufficiently Protected Credentials

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Improper Input Validation

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Resource Exhaustion

<0:9.0.15-1.redhat_00002.1.el8sso
  • H
Improperly Implemented Security Check for Standard

<0:9.0.5-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:9.0.5-1.redhat_00001.1.el8sso
  • M
Server-Side Request Forgery (SSRF)

<0:9.0.11-1.redhat_00001.1.el8sso
  • M
Cross-site Scripting (XSS)

<0:15.0.8-1.redhat_00001.1.el8sso
  • H
Improper Validation of Certificate with Host Mismatch

<0:4.8.20-1.Final_redhat_00001.1.el8sso
  • H
Insufficient Session Expiration

<0:4.8.20-1.Final_redhat_00001.1.el8sso
  • H
Improper Authentication

<0:4.8.20-1.Final_redhat_00001.1.el8sso
  • M
Authorization Bypass Through User-Controlled Key

<0:15.0.6-1.redhat_00002.1.el8sso
  • H
Improper Handling of Exceptional Conditions

<0:4.8.18-1.Final_redhat_00001.1.el8sso
  • L
Execution with Unnecessary Privileges

<0:9.0.10-1.redhat_00001.1.el8sso
  • M
Use of Password Hash With Insufficient Computational Effort

<0:9.0.9-1.redhat_00001.1.el8sso
  • M
Cross-site Scripting (XSS)

<0:9.0.9-1.redhat_00001.1.el8sso
  • H
Directory Traversal

<0:18.0.0-2.redhat_00001.1.el8sso
  • H
Incorrect Implementation of Authentication Algorithm

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Server-Side Request Forgery (SSRF)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
CVE-2022-2764

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Expected Behavior Violation

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Resource Exhaustion

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Unchecked Return Value

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Incorrect Authorization

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Memory Leak

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Cross-site Scripting (XSS)

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Allocation of Resources Without Limits or Throttling

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Improper Input Validation

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Deserialization of Untrusted Data

<0:18.0.3-1.redhat_00001.1.el8sso
  • H
Session Fixation

<0:18.0.3-1.redhat_00002.1.el8sso
  • H
Directory Traversal

<0:18.0.3-1.redhat_00002.1.el8sso
  • M
Information Exposure

<0:18.0.7-1.redhat_00001.1.el8sso
  • M
Uncontrolled Recursion

<0:18.0.7-1.redhat_00001.1.el8sso
  • M
HTTP Request Smuggling

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Creation of Temporary File With Insecure Permissions

<0:18.0.7-1.redhat_00001.1.el8sso
  • M
Improper Certificate Validation

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Out-of-bounds Write

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Incorrect Regular Expression

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Stack-based Buffer Overflow

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Out-of-bounds Write

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Directory Traversal

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Resource Exhaustion

<0:18.0.3-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:15.0.4-1.redhat_00003.1.el8sso
  • H
SQL Injection

<0:15.0.4-1.redhat_00003.1.el8sso
  • H
Deserialization of Untrusted Data

<0:15.0.4-1.redhat_00003.1.el8sso
  • L
Improper Input Validation

<0:15.0.6-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:15.0.4-1.redhat_00003.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Information Exposure

<0:15.0.4-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:4.8.13-1.Final_redhat_00001.1.el8sso