org.keycloak:keycloak-ldap-federation@12.0.2 vulnerabilities

  • latest version

    26.4.6

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    19 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.keycloak:keycloak-ldap-federation package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Deserialization of Untrusted Data

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the URL references when following referrals. An attacker can manipulate application behavior by configuring a malicious LDAP server and triggering deserialization of untrusted Java objects as an authenticated realm administrator.

    Notes:

    • This vulnerability can potentially result in JDNI references being used in case custom extensions were written for the library.
    • The fix for this issue was also back-ported into 26.2.11 which has not been published to Maven Central.

    How to fix Deserialization of Untrusted Data?

    Upgrade org.keycloak:keycloak-ldap-federation to version 26.4.6 or higher.

    [,26.4.6)
    • M
    Authentication Bypass Using an Alternate Path or Channel

    Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel that allows a user with an expired or disabled Active Directory account to trigger a password reset and gain access to the account. This is due to the fact that the password reset operation is executed without first validating the new credentials against Active Directory via an LDAP bind.

    How to fix Authentication Bypass Using an Alternate Path or Channel?

    Upgrade org.keycloak:keycloak-ldap-federation to version 26.1.0 or higher.

    [0,26.1.0)
    • M
    Unprotected Transport of Credentials

    Affected versions of this package are vulnerable to Unprotected Transport of Credentials for the LDAP testing endpoint, which allows the modification of the Connection URL without entering the LDAP bind credentials. An attacker with manage-realm permission can redirect the LDAP host to an arbitrary URL.

    How to fix Unprotected Transport of Credentials?

    Upgrade org.keycloak:keycloak-ldap-federation to version 24.0.6, 25.0.1 or higher.

    [,24.0.6)[25.0.0,25.0.1)
    • M
    LDAP Injection

    Affected versions of this package are vulnerable to LDAP Injection through the UsernameForm login process due to improper escape of LDAP ID. An attacker can access existing usernames in the server by exploiting an LDAP query.

    How to fix LDAP Injection?

    Upgrade org.keycloak:keycloak-ldap-federation to version 23.0.1 or higher.

    [,23.0.1)