org.keycloak:keycloak-server-spi-private@4.3.0.Final vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.keycloak:keycloak-server-spi-private package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
URL Redirection to Untrusted Site ('Open Redirect')

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to URL Redirection to Untrusted Site ('Open Redirect') due to a misconfiguration flaw in the validation of redirect URIs. An attacker can redirect users to an arbitrary URL and potentially expose sensitive information such as authorization codes, leading to session hijacking.

Note: This is only exploitable if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1.

How to fix URL Redirection to Untrusted Site ('Open Redirect')?

Upgrade org.keycloak:keycloak-server-spi-private to version 22.0.13, 24.0.8, 25.0.6 or higher.

[,22.0.13) [23.0.0,24.0.8) [25.0.0,25.0.6)
  • M
Missing Critical Step in Authentication

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to Missing Critical Step in Authentication in the form of not sufficiently enforcing the second factor in multifactor authentication. A user can register a second factor for a known account, allowing step-up authentication.

How to fix Missing Critical Step in Authentication?

Upgrade org.keycloak:keycloak-server-spi-private to version 22.0.10, 24.0.3 or higher.

[,22.0.10) [23.0.0,24.0.3)
  • L
Authentication Bypass by Spoofing

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to Authentication Bypass by Spoofing within the Keycloak Device Authorisation Grant due to improper verification of the device code holder. Exploiting this vulnerability is possible under certain pre-conditions and it allows an attacker to spoof parts of the device flow and use a device_code to retrieve an access token for other OAuth clients.

How to fix Authentication Bypass by Spoofing?

Upgrade org.keycloak:keycloak-server-spi-private to version 21.1.2 or higher.

[,21.1.2)
  • M
Information Exposure

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to Information Exposure. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later.

How to fix Information Exposure?

Upgrade org.keycloak:keycloak-server-spi-private to version 13.0.0 or higher.

[,13.0.0)
  • M
Cross-site Scripting (XSS)

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Keycloak's data filter would allow some data URLs to be navigated in some circumstances. An attacker could use this flaw to conduct cross-site scripting attacks. This vulnerability is related to an incomplete fix of CVE-2020-1697.

How to fix Cross-site Scripting (XSS)?

Upgrade org.keycloak:keycloak-server-spi-private to version 11.0.3 or higher.

[,11.0.3)
  • M
Cross-site Scripting (XSS)

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Links to external applications (Application Links) in the admin console are not validated properly.

How to fix Cross-site Scripting (XSS)?

Upgrade org.keycloak:keycloak-server-spi-private to version 9.0.0 or higher.

[,9.0.0)
  • M
Man-in-the-Middle (MitM)

org.keycloak:keycloak-server-spi-private is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols (http or ldap) and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.keycloak:keycloak-server-spi-private to version 6.0.0 or higher.

[,6.0.0)