org.cloudfoundry.identity:cloudfoundry-identity-server@3.4.4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.cloudfoundry.identity:cloudfoundry-identity-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the client token revocation endpoint. A user for a particular client can revoke client tokens for other users on the same client if the target is using opaque tokens or JWT tokens validated using the check_token endpoint.

How to fix Denial of Service (DoS)?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 4.5.6, 4.7.1 or higher.

[,4.5.6) [4.6.0,4.7.1)
  • H
Improper Restriction of Security Token Assignment

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Improper Restriction of Security Token Assignment that allows a remote authenticated user to modify the URL and content of a consent page to access a token with arbitrary scopes that escalates their privileges.

How to fix Improper Restriction of Security Token Assignment?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 4.23.0 or higher.

[,4.23.0)
  • M
Arbitrary Code Injection

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Arbitrary Code Injection. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about users of the UAA.

How to fix Arbitrary Code Injection?

A fix was pushed into the master branch but not yet published.

[0,)
  • M
Improper Authentication

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Improper Authentication. Due to improper checks of cookie secure flag.

How to fix Improper Authentication?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 74.25.0 or higher.

[0,74.25.0)
  • H
Session Fixation

org.cloudfoundry.identity:cloudfoundry-identity-server Affected versions of this package are vulnerable to session fixation attacks via the User Account and Authentication (UAA). When UAA is configured to authenticate against external SAML or OpenID Connect based identity providers.

[3.0.0,3.9.1)
  • H
Privilege Escalation

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to Privilege Escalation via the User Account and Authentication (UAA). Any user could pass a malicious token to a group endpoint, causing an elevation of privileges.

How to fix Privilege Escalation?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 3.15.0 or higher.

[3.0.0,3.15.0)
  • H
SQL Injection

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to SQL Injection, via the User Account and Authentication (UAA). The vulnerability occurs due to client_id string was not properly validated.

How to fix SQL Injection?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 3.15.0 or higher.

[,3.15.0)
  • M
SQL Injection

org.cloudfoundry.identity:cloudfoundry-identity-server is a Cloud Foundry User Account and Authentication (UAA) Server.

Affected versions of this package are vulnerable to SQL Injection via the User Account and Authentication (UAA).

How to fix SQL Injection?

Upgrade org.cloudfoundry.identity:cloudfoundry-identity-server to version 3.16.0 or higher.

[,3.16.0)
  • H
Remote Privilege Escalation

org.cloudfoundry.identity:cloudfoundry-identity-server The UAA /oauth/token endpoint in Pivotal Cloud Foundry (PCF) before 243; UAA 2.x before 2.7.4.8, 3.x before 3.3.0.6, and 3.4.x before 3.4.5; UAA BOSH before 11.7 and 12.x before 12.6; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allows remote authenticated users to gain privileges by leveraging possession of a token.

[3.0.0,3.3.0.6) [3.4.0,3.4.5) [3.5.0,3.7.3)