4.30.0
9 years ago
5 years ago
Known vulnerabilities in the org.cloudfoundry.identity:cloudfoundry-identity-uaa package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a Cloud Foundry User Account and Authentication plugin. Affected versions of this package are vulnerable to Denial of Service (DoS) in the client token revocation endpoint. A user for a particular client can revoke client tokens for other users on the same client if the target is using opaque tokens or JWT tokens validated using the How to fix Denial of Service (DoS)? Upgrade | [,4.5.6)[4.6.0,4.7.1) |
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a Cloud Foundry User Account and Authentication plugin. Affected versions of this package are vulnerable to Privilege Escalation. An attacker can gain privileges by accessing UAA logs and subsequently running a specially crafted application that interacts with a configured SAML provider. How to fix Privilege Escalation? Upgrade | [3.0.0,3.6.5)[3.7,3.9.3)[2.0.0,2.7.4.12) |
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a CloudFoundry User Account and Authentication (UAA) Server. Affected version of this package are vulnerable to HTTP Headers Forwarding, which could result in account corruption. How to fix HTTP Headers Forwarding? Upgrade | [3.0.0,3.6.12)[3.7,3.9.14)[3.10.0,3.19.0) |
| [,2.7.4.9][3.0.0,3.9.1] |
org.cloudfoundry.identity:cloudfoundry-identity-uaa is a Cloud Foundry User Account and Authentication plugin. Affected versions of this package are vulnerable to Privilege Escalation via the User Account and Authentication (UAA). Any user could pass a malicious token to a group endpoint, causing an elevation of privileges. | [,2.7.4.9][3.0.0,3.9.1] |
| [2.2.4,2.7.4.4)[3.0.0,3.3.0.2)[3.4,3.4.1) |