org.cloudfoundry.identity%3Acloudfoundry-identity-uaa@2.5.2 vulnerabilities
-
latest version
4.30.0
-
latest non vulnerable version
-
first published
9 years ago
-
latest version published
5 years ago
-
licenses detected
- [0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.cloudfoundry.identity%3Acloudfoundry-identity-uaa package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a Cloud Foundry User Account and Authentication plugin. Affected versions of this package are vulnerable to Denial of Service (DoS) in the client token revocation endpoint. A user for a particular client can revoke client tokens for other users on the same client if the target is using opaque tokens or JWT tokens validated using the How to fix Denial of Service (DoS)? Upgrade |
[,4.5.6)
[4.6.0,4.7.1)
|
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a Cloud Foundry User Account and Authentication plugin. Affected versions of this package are vulnerable to Privilege Escalation. An attacker can gain privileges by accessing UAA logs and subsequently running a specially crafted application that interacts with a configured SAML provider. How to fix Privilege Escalation? Upgrade |
[3.0.0,3.6.5)
[3.7,3.9.3)
[2.0.0,2.7.4.12)
|
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a CloudFoundry User Account and Authentication (UAA) Server. Affected versions of this package are vulnerable to Improper Privileges. Privileged users in one zone are allowed to perform a password reset for users in a different zone. How to fix Improper Privileges? Upgrade |
[2.0.0,2.7.4.16)
[3.6.0,3.6.10)
[3.9.0,3.9.12)
[3.10.0,3.17.0)
|
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a CloudFoundry User Account and Authentication (UAA) Server. Affected versions of this package are vulnerable to Privilege Escalation. Any user or client can access the invitations endpoint to generate a code and perform a password reset for a different user in the system. How to fix Privilege Escalation? Upgrade |
[2.0,2.7.4.17)
[3.6.0,3.6.11)
[3.9.0,3.9.13)
[4.0,4.2.0)
|
|
[,2.7.4.9]
[3.0.0,3.9.1]
|
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a Cloud Foundry User Account and Authentication plugin. Affected versions of this package are vulnerable to Privilege Escalation via the User Account and Authentication (UAA). Any user could pass a malicious token to a group endpoint, causing an elevation of privileges. |
[,2.7.4.9]
[3.0.0,3.9.1]
|
|
[2.2.4,2.7.4.4)
[3.0.0,3.3.0.2)
[3.4,3.4.1)
|