rh-sso7-keycloak vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rh-sso7-keycloak package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Inefficient Regular Expression Complexity

*
  • L
Overly Restrictive Account Lockout Mechanism

*
  • L
Improper Check for Dropped Privileges

*
  • M
Improper Authentication

*
  • L
Information Exposure

*
  • L
Cross-site Request Forgery (CSRF)

*
  • M
Missing Authentication for Critical Function

*
  • M
Improper Authentication

*
  • L
Covert Timing Channel

*
  • L
Improper Input Validation

*
  • M
Improper Handling of Extra Values

*
  • M
Client-Side Enforcement of Server-Side Security

*
  • L
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:18.0.19-1.redhat_00002.1.el9sso
  • H
Open Redirect

<0:18.0.18-1.redhat_00001.1.el9sso
  • H
Improper Verification of Cryptographic Signature

<0:18.0.18-1.redhat_00001.1.el9sso
  • M
Session Fixation

<0:18.0.16-1.redhat_00001.1.el9sso
  • M
Incorrect Default Permissions

<0:18.0.16-1.redhat_00001.1.el9sso
  • M
Improper Enforcement of a Single

<0:18.0.16-1.redhat_00001.1.el9sso
  • L
Cleartext Storage of Sensitive Information in a Cookie

<0:18.0.14-1.redhat_00001.1.el9sso
  • H
Resource Exhaustion

<0:18.0.13-1.redhat_00001.1.el9sso
  • H
Origin Validation Error

<0:18.0.13-1.redhat_00001.1.el9sso
  • H
Directory Traversal

<0:18.0.13-1.redhat_00001.1.el9sso
  • H
Permissive Regular Expression

<0:18.0.13-1.redhat_00001.1.el9sso
  • H
Improper Output Neutralization for Logs

<0:18.0.13-1.redhat_00001.1.el9sso
  • H
Information Exposure Through Log Files

<0:18.0.12-1.redhat_00001.1.el9sso
  • H
Files or Directories Accessible to External Parties

<0:18.0.12-1.redhat_00001.1.el9sso
  • H
Improper Validation of Syntactic Correctness of Input

<0:18.0.12-1.redhat_00001.1.el9sso
  • H
Allocation of Resources Without Limits or Throttling

<0:18.0.12-1.redhat_00001.1.el9sso
  • M
Improper Input Validation

<0:18.0.11-3.redhat_00001.1.el9sso
  • M
Open Redirect

<0:18.0.11-3.redhat_00001.1.el9sso
  • H
Allocation of Resources Without Limits or Throttling

<0:18.0.11-2.redhat_00003.1.el9sso
  • H
Open Redirect

<0:18.0.11-2.redhat_00003.1.el9sso
  • H
Arbitrary Code Injection

<0:18.0.11-2.redhat_00003.1.el9sso
  • H
Resource Exhaustion

<0:18.0.11-2.redhat_00001.1.el9sso
  • H
Information Exposure

<0:18.0.11-2.redhat_00001.1.el9sso
  • H
Improper Enforcement of Behavioral Workflow

<0:18.0.11-2.redhat_00001.1.el9sso
  • H
Uncontrolled Memory Allocation

<0:18.0.9-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.8-1.redhat_00001.1.el9sso
  • H
Improperly Implemented Security Check for Standard

<0:18.0.8-1.redhat_00001.1.el9sso
  • H
Improper Certificate Validation

<0:18.0.8-1.redhat_00001.1.el9sso
  • H
Resource Exhaustion

<0:18.0.9-1.redhat_00001.1.el9sso
  • M
Information Exposure Through Server Error Message

<0:18.0.7-1.redhat_00001.1.el9sso
  • H
Uncontrolled Recursion

<0:18.0.9-1.redhat_00001.1.el9sso
  • H
Improper Certificate Validation

<0:18.0.8-1.redhat_00001.1.el9sso
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:18.0.8-1.redhat_00001.1.el9sso
  • H
Incorrect Implementation of Authentication Algorithm

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Server-Side Request Forgery (SSRF)

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
CVE-2022-2764

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso
  • M
Expected Behavior Violation

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Resource Exhaustion

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Unchecked Return Value

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Incorrect Authorization

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Memory Leak

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Cross-site Scripting (XSS)

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Allocation of Resources Without Limits or Throttling

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Improper Input Validation

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Deserialization of Untrusted Data

<0:18.0.3-1.redhat_00001.1.el9sso
  • H
Session Fixation

<0:18.0.3-1.redhat_00002.1.el9sso
  • H
Directory Traversal

<0:18.0.3-1.redhat_00002.1.el9sso
  • M
Information Exposure

<0:18.0.7-1.redhat_00001.1.el9sso
  • M
Uncontrolled Recursion

<0:18.0.7-1.redhat_00001.1.el9sso
  • M
HTTP Request Smuggling

<0:18.0.3-1.redhat_00001.1.el9sso
  • M
Creation of Temporary File With Insecure Permissions

<0:18.0.7-1.redhat_00001.1.el9sso
  • M
Improper Certificate Validation

<0:18.0.7-1.redhat_00001.1.el9sso
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el9sso
  • M
Out-of-bounds Write

<0:18.0.7-1.redhat_00001.1.el9sso
  • H
Improper Input Validation

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Incorrect Regular Expression

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Stack-based Buffer Overflow

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Deserialization of Untrusted Data

<0:18.0.6-1.redhat_00001.1.el9sso
  • M
Out-of-bounds Write

<0:18.0.7-1.redhat_00001.1.el9sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Out-of-bounds Write

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Resource Exhaustion

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Directory Traversal

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:18.0.6-1.redhat_00001.1.el9sso
  • M
Resource Exhaustion

<0:18.0.3-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso
  • H
Cross-site Scripting (XSS)

<0:18.0.6-1.redhat_00001.1.el9sso