org.keycloak:keycloak-model-infinispan@2.2.0.CR1 vulnerabilities

  • latest version

    26.0.6

  • latest non vulnerable version

  • first published

    8 years ago

  • latest version published

    24 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.keycloak:keycloak-model-infinispan package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Access Restriction Bypass

    org.keycloak:keycloak-model-infinispan is a part of the keycloak project.

    Affected versions of this package are vulnerable to Access Restriction Bypass in the authorization behavior of infinispan/UserCacheSession.java and jpa/JpaUserProvider.java. An attacker with knowledge of a user ID can use this flaw to access unauthorized information or to carry out further attacks.

    How to fix Access Restriction Bypass?

    Upgrade org.keycloak:keycloak-model-infinispan to version 7.0.1 or higher.

    [,7.0.1)
    • M
    Denial of Service (DoS)

    org.keycloak:keycloak-model-infinispan is a part of the keycloak project.

    Affected versions of this package are vulnerable to Denial of Service (DoS). A flaw was found in keycloak-model-infinispan where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.

    How to fix Denial of Service (DoS)?

    Upgrade org.keycloak:keycloak-model-infinispan to version 14.0.0 or higher.

    [,14.0.0)
    • M
    Denial of Service (DoS)

    org.keycloak:keycloak-model-infinispan is a part of the keycloak project.

    Affected versions of this package are vulnerable to Denial of Service (DoS). A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.

    How to fix Denial of Service (DoS)?

    Upgrade org.keycloak:keycloak-model-infinispan to version 4.0.0.Final or higher.

    [,4.0.0.Final)
    • M
    Access Restriction Bypass

    org.keycloak:keycloak-model-infinispan is a part of the keycloak project.

    Affected versions of this package are vulnerable to Access Restriction Bypass. It did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.

    How to fix Access Restriction Bypass?

    Upgrade org.keycloak:keycloak-model-infinispan to version 2.4.0.Final or higher.

    [,2.4.0.Final)