26.4.6
4 years ago
19 days ago
Known vulnerabilities in the org.keycloak:keycloak-quarkus-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
Affected versions of this package are vulnerable to Uncontrolled Search Path Element via the The responsibility for validating paths is generally delegated to the proxy, but the project maintainers have determined that the default behavior of not accepting non-normalized paths should be enforced by the library, for defense in depth. How to fix Uncontrolled Search Path Element? Upgrade | [,26.4.0) |
Affected versions of this package are vulnerable to Use of Hard-coded Credentials due to sensitive runtime values being captured during the build process and embedded as default values in Note: For versions 26.x, sensitive data specified directly in environment variables during the build process is also stored as a default value, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by How to fix Use of Hard-coded Credentials? Upgrade | [,26.0.6) |
Affected versions of this package are vulnerable to HTTP Request Smuggling due to improper handling of proxy headers resulting in costly DNS resolution operations. An attacker could tie up IO threads and potentially cause a denial of service by exploiting these operations. Notes:
How to fix HTTP Request Smuggling? Upgrade | [,26.0.6) |