26.0.7
11 years ago
1 months ago
Known vulnerabilities in the org.keycloak:keycloak-model-jpa package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.keycloak:keycloak-model-jpa is an Identity and Access Management module for Keycloak JPA. Affected versions of this package are vulnerable to Exposure of Sensitive Information Through Environmental Variables through user-configurable URLs. Exploiting this vulnerability is possible with the configuration of backchannel logout URLs or admin URLs, when including placeholders like How to fix Exposure of Sensitive Information Through Environmental Variables? Upgrade | [,26.0.8) |
org.keycloak:keycloak-model-jpa is an Identity and Access Management module for Keycloak JPA. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to an unconstrained memory consumption issue when the Note: This is only exploitable if the environment has millions of offline tokens (more than 500,000 users with each having at least 2 saved sessions). How to fix Allocation of Resources Without Limits or Throttling? Upgrade | [,21.0.0) |
org.keycloak:keycloak-model-jpa is an Identity and Access Management module for Keycloak JPA. Affected versions of this package are vulnerable to Improper Authorization. A community-only flaw was found in Keycloak, where a malicious user registers as oneself. The attacker could then use the remove devices form to post different credential IDs and possibly remove MFA devices for other users. How to fix Improper Authorization? Upgrade | [,9.0.2) |