org.cloudfoundry.identity:cloudfoundry-identity-server@3.4.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.cloudfoundry.identity:cloudfoundry-identity-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the client token revocation endpoint. A user for a particular client can revoke client tokens for other users on the same client if the target is using opaque tokens or JWT tokens validated using the check_token endpoint.

How to fix Denial of Service (DoS)?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 4.5.6, 4.7.1 or higher.

[,4.5.6) [4.6.0,4.7.1)
  • H
Improper Restriction of Security Token Assignment

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Improper Restriction of Security Token Assignment that allows a remote authenticated user to modify the URL and content of a consent page to access a token with arbitrary scopes that escalates their privileges.

How to fix Improper Restriction of Security Token Assignment?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 4.23.0 or higher.

[,4.23.0)
  • M
Arbitrary Code Injection

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Arbitrary Code Injection. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about users of the UAA.

How to fix Arbitrary Code Injection?

A fix was pushed into the master branch but not yet published.

[0,)
  • M
Improper Authentication

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Improper Authentication. Due to improper checks of cookie secure flag.

How to fix Improper Authentication?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 74.25.0 or higher.

[0,74.25.0)
  • H
Session Fixation

org.cloudfoundry.identity:cloudfoundry-identity-server Affected versions of this package are vulnerable to session fixation attacks via the User Account and Authentication (UAA). When UAA is configured to authenticate against external SAML or OpenID Connect based identity providers.

[3.0.0,3.9.1)
  • H
SQL Injection

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to SQL Injection, via the User Account and Authentication (UAA). The vulnerability occurs due to client_id string was not properly validated.

How to fix SQL Injection?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 3.15.0 or higher.

[,3.15.0)
  • M
SQL Injection

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to SQL Injection via the User Account and Authentication (UAA).

How to fix SQL Injection?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 3.16.0 or higher.

[,3.16.0)
  • H
Privilege Escalation

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Privilege Escalation via the User Account and Authentication (UAA). Any user could pass a malicious token to a group endpoint, causing an elevation of privileges.

How to fix Privilege Escalation?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 3.15.0 or higher.

[3.0.0,3.15.0)
  • M
Improper Validation of Certificate Expiration

org.cloudfoundry.identity:cloudfoundry-identity-server Affected versions of the package do not check for certificate expiration dates by default.

[3.0.0,3.3.0.3) [3.4,3.4.1)
  • C
Cross-site Request Forgery (CSRF)

org.cloudfoundry.identity:cloudfoundry-identity-server Multiple cross-site request forgery (CSRF) vulnerabilities in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allow remote attackers to hijack the authentication of unspecified victims for requests that approve or deny a scope via a profile or authorize approval page.

[3.0.0,3.3.0.5) [3.4.0,3.4.4)
  • M
Open Redirect

org.cloudfoundry.identity:cloudfoundry-identity-server The OAuth authorization implementation in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.1; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 mishandles redirect_uri subdomains, which allows remote attackers to obtain implicit access tokens via a modified subdomain.

[3.0.0,3.3.0.5) [3.4.0,3.4.4)
  • H
Remote Privilege Escalation

org.cloudfoundry.identity:cloudfoundry-identity-server The UAA /oauth/token endpoint in Pivotal Cloud Foundry (PCF) before 243; UAA 2.x before 2.7.4.8, 3.x before 3.3.0.6, and 3.4.x before 3.4.5; UAA BOSH before 11.7 and 12.x before 12.6; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allows remote authenticated users to gain privileges by leveraging possession of a token.

[3.0.0,3.3.0.6) [3.4.0,3.4.5) [3.5.0,3.7.3)
  • H
SQL Injection

org.cloudfoundry.identity:cloudfoundry-identity-server Affected versions of the package are vulnerable to SQL Injection.

[3.0.0,3.3.0.2) [3.4,3.4.1)