rh-sso7-keycloak vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rh-sso7-keycloak package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Open Redirect

<0:18.0.18-1.redhat_00001.1.el8sso
  • H
Improper Verification of Cryptographic Signature

<0:18.0.18-1.redhat_00001.1.el8sso
  • M
Session Fixation

<0:18.0.16-1.redhat_00001.1.el8sso
  • M
Incorrect Default Permissions

<0:18.0.16-1.redhat_00001.1.el8sso
  • M
Improper Enforcement of a Single

<0:18.0.16-1.redhat_00001.1.el8sso
  • L
Cleartext Storage of Sensitive Information in a Cookie

<0:18.0.14-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Origin Validation Error

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Directory Traversal

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Permissive Regular Expression

<0:18.0.13-1.redhat_00001.1.el8sso
  • H
Improper Output Neutralization for Logs

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Information Exposure Through Log Files

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Files or Directories Accessible to External Parties

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Improper Validation of Syntactic Correctness of Input

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Allocation of Resources Without Limits or Throttling

<0:18.0.12-1.redhat_00001.1.el8sso
  • M
Improper Input Validation

<0:18.0.11-3.redhat_00001.1.el8sso
  • M
Open Redirect

<0:18.0.11-3.redhat_00001.1.el8sso
  • H
Allocation of Resources Without Limits or Throttling

<0:18.0.11-2.redhat_00003.1.el8sso
  • H
Open Redirect

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Arbitrary Code Injection

<0:18.0.12-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.11-2.redhat_00001.1.el8sso
  • H
Information Exposure

<0:18.0.11-2.redhat_00001.1.el8sso
  • H
Improper Enforcement of Behavioral Workflow

<0:18.0.11-2.redhat_00001.1.el8sso
  • H
Uncontrolled Memory Allocation

<0:18.0.9-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Improperly Implemented Security Check for Standard

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Improper Certificate Validation

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.9-1.redhat_00001.1.el8sso
  • M
Information Exposure Through Server Error Message

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Uncontrolled Recursion

<0:18.0.9-1.redhat_00001.1.el8sso
  • H
Improper Certificate Validation

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:18.0.8-1.redhat_00001.1.el8sso
  • H
XML External Entity (XXE) Injection

<0:18.0.0-2.redhat_00001.1.el8sso
  • H
Incorrect Authorization

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Information Exposure

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Missing Authorization

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Authentication Bypass

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Improper Access Control

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Use of Hard-coded

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Information Exposure

<0:15.0.4-1.redhat_00003.1.el8sso
  • L
Cross-site Scripting (XSS)

<0:9.0.12-1.redhat_00001.1.el8sso
  • L
Authentication Bypass

<0:9.0.12-1.redhat_00001.1.el8sso
  • H
Incorrect Authorization

<0:15.0.2-3.redhat_00002.1.el8sso
  • H
Information Exposure

<0:15.0.4-1.redhat_00001.1.el8sso
  • H
Improper Authentication

<0:15.0.4-1.redhat_00001.1.el8sso
  • M
Insufficient Session Expiration

<0:9.0.13-1.redhat_00006.1.el8sso
  • M
Improper Authentication

<0:9.0.13-1.redhat_00006.1.el8sso
  • M
Allocation of Resources Without Limits or Throttling

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Improper Authentication

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Insufficiently Protected Credentials

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Improper Input Validation

<0:9.0.15-1.redhat_00002.1.el8sso
  • M
Resource Exhaustion

<0:9.0.15-1.redhat_00002.1.el8sso
  • H
Improperly Implemented Security Check for Standard

<0:9.0.5-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:9.0.5-1.redhat_00001.1.el8sso
  • M
Server-Side Request Forgery (SSRF)

<0:9.0.11-1.redhat_00001.1.el8sso
  • M
Cross-site Scripting (XSS)

<0:15.0.8-1.redhat_00001.1.el8sso
  • H
Improper Validation of Certificate with Host Mismatch

<0:4.8.20-1.Final_redhat_00001.1.el8sso
  • H
Insufficient Session Expiration

<0:4.8.20-1.Final_redhat_00001.1.el8sso
  • H
Improper Authentication

<0:4.8.20-1.Final_redhat_00001.1.el8sso
  • M
Authorization Bypass Through User-Controlled Key

<0:15.0.6-1.redhat_00002.1.el8sso
  • H
Improper Handling of Exceptional Conditions

<0:4.8.18-1.Final_redhat_00001.1.el8sso
  • L
Execution with Unnecessary Privileges

<0:9.0.10-1.redhat_00001.1.el8sso
  • M
Use of Password Hash With Insufficient Computational Effort

<0:9.0.9-1.redhat_00001.1.el8sso
  • M
Cross-site Scripting (XSS)

<0:9.0.9-1.redhat_00001.1.el8sso
  • H
Directory Traversal

<0:18.0.0-2.redhat_00001.1.el8sso
  • H
Incorrect Implementation of Authentication Algorithm

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Server-Side Request Forgery (SSRF)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
CVE-2022-2764

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Expected Behavior Violation

<0:15.0.8-1.redhat_00001.1.el8sso
  • M
Resource Exhaustion

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Unchecked Return Value

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Incorrect Authorization

<0:15.0.8-1.redhat_00001.1.el8sso
  • M
Memory Leak

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Cross-site Scripting (XSS)

<0:15.0.8-1.redhat_00001.1.el8sso
  • M
Allocation of Resources Without Limits or Throttling

<0:15.0.8-1.redhat_00001.1.el8sso
  • M
Improper Input Validation

<0:18.0.3-1.redhat_00001.1.el8sso
  • M
Deserialization of Untrusted Data

<0:15.0.8-1.redhat_00001.1.el8sso
  • H
Session Fixation

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Directory Traversal

<0:18.0.3-1.redhat_00002.1.el8sso
  • M
Information Exposure

<0:18.0.7-1.redhat_00001.1.el8sso
  • M
Uncontrolled Recursion

<0:18.0.7-1.redhat_00001.1.el8sso
  • M
HTTP Request Smuggling

<0:15.0.8-1.redhat_00001.1.el8sso
  • M
Creation of Temporary File With Insecure Permissions

<0:18.0.7-1.redhat_00001.1.el8sso
  • M
Improper Certificate Validation

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Out-of-bounds Write

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Incorrect Regular Expression

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Stack-based Buffer Overflow

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Out-of-bounds Write

<0:18.0.7-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Directory Traversal

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:18.0.6-1.redhat_00001.1.el8sso
  • M
Resource Exhaustion

<0:15.0.8-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:15.0.4-1.redhat_00003.1.el8sso
  • H
SQL Injection

<0:15.0.4-1.redhat_00003.1.el8sso
  • H
Deserialization of Untrusted Data

<0:15.0.4-1.redhat_00003.1.el8sso
  • L
Improper Input Validation

<0:15.0.6-1.redhat_00001.1.el8sso
  • H
Improper Input Validation

<0:15.0.4-1.redhat_00003.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Resource Exhaustion

<0:4.8.15-1.Final_redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:4.8.13-1.Final_redhat_00001.1.el8sso
  • H
Information Exposure

<0:15.0.4-1.redhat_00001.1.el8sso
  • H
Deserialization of Untrusted Data

<0:4.8.13-1.Final_redhat_00001.1.el8sso