org.keycloak:keycloak-services@26.0.5

  • latest version

    26.5.6

  • first published

    12 years ago

  • latest version published

    14 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.keycloak:keycloak-services package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Server-side Request Forgery (SSRF)

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the client_session_host parameter during refresh token requests when the client is configured to use the backchannel.logout.url with the application.session.host placeholder. An attacker can cause the server to make HTTP requests to arbitrary internal or external endpoints by manipulating this parameter, potentially leading to information disclosure by probing internal networks or APIs.

    How to fix Server-side Request Forgery (SSRF)?

    There is no fixed version for org.keycloak:keycloak-services.

    [0,)
    • M
    Information Exposure

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Information Exposure in the identity-first login flow when Organizations are enabled. An attacker can obtain information about the existence of users by analyzing differential error messages.

    How to fix Information Exposure?

    There is no fixed version for org.keycloak:keycloak-services.

    [0,)
    • M
    Access Control Bypass

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Access Control Bypass due to incomplete enforcement of access control checks on PUT operations to the resource_set endpoint. An attacker can modify protected resources without proper authorization by sending crafted requests to this endpoint when the allowRemoteResourceManagement setting is set to false.

    How to fix Access Control Bypass?

    There is no fixed version for org.keycloak:keycloak-services.

    [0,)
    • M
    Server-side Request Forgery (SSRF)

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) when processing client configuration requests. An attacker can make unintended requests to internal or restricted resources by sending a malicious sector_identifier_uri that accesses addresses such as a cloud metadata services at 169.254.169.254.

    How to fix Server-side Request Forgery (SSRF)?

    There is no fixed version for org.keycloak:keycloak-services.

    [0,)
    • M
    Improper Validation of Specified Type of Input

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Validation of Specified Type of Input via improper validation of encrypted SAML assertions. An attacker can gain unauthorized access by submitting specially crafted SAML assertions.

    How to fix Improper Validation of Specified Type of Input?

    Upgrade org.keycloak:keycloak-services to version 26.2.14, 26.4.10, 26.5.5 or higher.

    [,26.2.14)[26.3.0,26.4.10)[26.5.0,26.5.5)
    • H
    Authentication Bypass by Primary Weakness

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Authentication Bypass by Primary Weakness via the SAML Identity Provider authentication process when it is disabled. An attacker can gain unauthorized access by exploiting the ability to authenticate through a provider that should not be available.

    How to fix Authentication Bypass by Primary Weakness?

    Upgrade org.keycloak:keycloak-services to version 26.2.14, 26.4.10, 26.5.5 or higher.

    [,26.2.14)[26.3.0,26.4.10)[26.5.0,26.5.5)
    • H
    Authorization Bypass Through User-Controlled Key

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the IdentityBrokerService.performLogin endpoint. An attacker can gain unauthorized access and bypass administrative restrictions by reusing a previously generated login request referencing a disabled external identity provider.

    How to fix Authorization Bypass Through User-Controlled Key?

    Upgrade org.keycloak:keycloak-services to version 26.2.14, 26.4.10, 26.5.5 or higher.

    [,26.2.14)[26.3.0,26.4.10)[26.5.0,26.5.5)
    • H
    Authentication Bypass by Primary Weakness

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Authentication Bypass by Primary Weakness when a disabled SAML client is configured as an Identity Provider (IdP)-initiated broker landing target. An attacker can gain unauthorized access to other enabled clients via a Single Sign-On (SSO) session.

    How to fix Authentication Bypass by Primary Weakness?

    Upgrade org.keycloak:keycloak-services to version 26.2.14, 26.4.10, 26.5.5 or higher.

    [,26.2.14)[26.3.0,26.4.10)[26.5.0,26.5.5)
    • L
    Missing Critical Step in Authentication

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Missing Critical Step in Authentication due to insufficient validation of the authentication Level of Assurance in the Account REST API. An attacker can gain control over a victim's account by deleting the victim's registered MFA device and registering their own, provided they have obtained the victim's primary credentials.

    How to fix Missing Critical Step in Authentication?

    There is no fixed version for org.keycloak:keycloak-services.

    [0,)
    • M
    Improper Handling of Insufficient Permissions or Privileges

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Handling of Insufficient Permissions or Privileges via improper enforcement of roles in the UMA 2.0 Protection API which fails to enforce the uma_protection role check. An attacker can access sensitive information by leveraging insufficient permission checks.

    How to fix Improper Handling of Insufficient Permissions or Privileges?

    There is no fixed version for org.keycloak:keycloak-services.

    [0,)
    • H
    Incorrect Privilege Assignment

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Incorrect Privilege Assignment via the manage-clients permission assignment. An attacker can gain unauthorized access to higher-privileged operations by exploiting insufficient enforcement of access controls.

    How to fix Incorrect Privilege Assignment?

    Upgrade org.keycloak:keycloak-services to version 26.5.6 or higher.

    [0,26.5.6)
    • M
    Improper Authorization

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Authorization in the /protocol/docker-v2/auth endpoint, which does not ensure that the client is in “Enabled” status before granting an access token. This allows a user in possession of valid credentials and the client ID of a disabled client to bypass administrative restrictions.

    How to fix Improper Authorization?

    Upgrade org.keycloak:keycloak-services to version 26.5.4 or higher.

    [0,26.5.4)
    • H
    Improper Handling of Highly Compressed Data (Data Amplification)

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) via the SAMLRequest DEFLATE decompression. An attacker can cause service disruption by sending a highly compressed requests that trigger excessive resource consumption during decompression.

    How to fix Improper Handling of Highly Compressed Data (Data Amplification)?

    Upgrade org.keycloak:keycloak-services to version 26.5.4 or higher.

    [1.9.0.CR1,26.5.4)
    • L
    Authorization Bypass Through User-Controlled Key

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the Admin API when the Organizations feature is enabled. An authenticated attacker can enumerate the organization memberships of any other user if their unique identifier (UUID) is known.

    Note:

    This is only exploitable if the Organizations feature is enabled (which is the default in recent versions), the attacker possesses a valid access token for the realm and the attacker knows the UUID of the victim user.

    How to fix Authorization Bypass Through User-Controlled Key?

    Upgrade org.keycloak:keycloak-services to version 26.5.6 or higher.

    [0,26.5.6)
    • H
    Improper Verification of Cryptographic Signature

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the invitation tokens in the registration process. An attacker can gain unauthorized access to organizations by modifying the organization ID and target email within a legitimate invitation token's JWT payload.

    How to fix Improper Verification of Cryptographic Signature?

    Upgrade org.keycloak:keycloak-services to version 26.5.3 or higher.

    [,26.5.3)
    • H
    Improperly Implemented Security Check for Standard

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improperly Implemented Security Check for Standard due to improper verification if an Identity Provider (IdP) is enabled before issuing tokens. An attacker can gain unauthorized access by issuing valid access tokens using a disabled Identity Provider's signing key.

    How to fix Improperly Implemented Security Check for Standard?

    Upgrade org.keycloak:keycloak-services to version 26.5.3 or higher.

    [,26.5.3)
    • M
    Incorrect Privilege Assignment

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Incorrect Privilege Assignment due to insufficient ownership verification in the UserManagedPermissionService (UMA Protection API). An attacker can gain unauthorized access to modify or delete authorization rules for resources they do not own by updating or deleting a policy associated with multiple resources, where the authorization check only validates ownership of the first resource in the list.

    How to fix Incorrect Privilege Assignment?

    Upgrade org.keycloak:keycloak-services to version 26.5.3 or higher.

    [,26.5.3)
    • M
    Server-side Request Forgery (SSRF)

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via insufficient validation of the backchannel_client_notification_endpoint, which is configured during client registration or administration. A privileged user can make unauthorized requests to internal services, but cannot access the responses.

    How to fix Server-side Request Forgery (SSRF)?

    There is no fixed version for org.keycloak:keycloak-services.

    [0,)
    • H
    Improper Enforcement of Behavioral Workflow

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Enforcement of Behavioral Workflow via the Token Exchange implementation. An attacker can obtain access and refresh tokens for users who have been disabled by invoking the token exchange flow with a privileged client, potentially resulting in unauthorized access to previously revoked privileges.

    How to fix Improper Enforcement of Behavioral Workflow?

    Upgrade org.keycloak:keycloak-services to version 26.5.2 or higher.

    [,26.5.2)
    • L
    Time-of-check Time-of-use (TOCTOU) Race Condition

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the validateTokenReuse method in the TokenManager class. An attacker can obtain multiple access tokens from a single refresh token by making concurrent refresh requests.

    How to fix Time-of-check Time-of-use (TOCTOU) Race Condition?

    A fix was pushed into the master branch but not yet published.

    [0,)
    • L
    Missing XML Validation

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Missing XML Validation of the NotOnOrAfter timestamp in SubjectConfirmationData when SAML is configured to act as a client (SAML brokering). An attacker can extend the validity of SAML responses by manipulating the timestamp, potentially resulting in prolonged session durations or increased resource usage.

    How to fix Missing XML Validation?

    Upgrade org.keycloak:keycloak-services to version 26.5.4 or higher.

    [0,26.5.4)
    • M
    Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Incorrect Behavior Order: Authorization Before Parsing and Canonicalization due to the Authorization header parser accepting non-standard characters as separators and tolerating case variations that do not comply with RFC 6750 specifications. An attacker can bypass intended access restrictions by crafting specially formatted authentication headers.

    How to fix Incorrect Behavior Order: Authorization Before Parsing and Canonicalization?

    Upgrade org.keycloak:keycloak-services to version 26.5.4 or higher.

    [9.0.0,26.5.4)
    • H
    Authentication Bypass by Alternate Name

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Authentication Bypass by Alternate Name via the ResourceSetService and PermissionTicketService modules due to improper verification of resourceServer ID. An attacker can access and modify resources belonging to other clients by supplying a valid resourceId in the admin API endpoints, bypassing proper authorization checks.

    How to fix Authentication Bypass by Alternate Name?

    Upgrade org.keycloak:keycloak-services to version 26.5.6 or higher.

    [0,26.5.6)
    • M
    Access Control Bypass

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Access Control Bypass via the /admin/realms/master/users/profile endpoint. An attacker can access internal user profile schema data by leveraging 'create-client' permissions.

    How to fix Access Control Bypass?

    Upgrade org.keycloak:keycloak-services to version 26.5.0 or higher.

    [0,26.5.0)
    • L
    Missing Critical Step in Authentication

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Missing Critical Step in Authentication in the WebAuthn Attestation Statement verification. An attacker can influence policy enforcement by manipulating the registration flow or using a rogue authenticator under user control.

    How to fix Missing Critical Step in Authentication?

    Upgrade org.keycloak:keycloak-services to version 26.5.1 or higher.

    [0,26.5.1)
    • M
    CRLF Injection

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to CRLF Injection during the e-mail registration. An attacker can cause the system to send unsolicited emails limited to 64 characters by injecting special characters into the email input field.

    How to fix CRLF Injection?

    Upgrade org.keycloak:keycloak-services to version 26.3.3 or higher.

    [,26.3.3)
    • M
    Insufficient Session Expiration

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Insufficient Session Expiration due to the offline session of a user not being invalidated when the offline_access scope is removed. An attacker can maintain access to refresh tokens and continue to request new tokens by leveraging a session that should have been invalidated after scope removal.

    How to fix Insufficient Session Expiration?

    Upgrade org.keycloak:keycloak-services to version 26.3.0 or higher.

    [,26.3.0)
    • L
    Insufficient Session Expiration

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Insufficient Session Expiration in the "Remember Me" realm setting. An attacker with a long-lived "Remember Me" session (e.g., stole the identity cookie) can maintain access for the full original remember-me lifetime to gain unauthorized access to sensitive information or perform actions as another user.

    How to fix Insufficient Session Expiration?

    Upgrade org.keycloak:keycloak-services to version 26.4.2 or higher.

    [,26.4.2)
    • M
    Exposure of Sensitive System Information to an Unauthorized Control Sphere

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere via the /admin/serverinfo endpoint, which exposes internal server details, when an authenticated user logs into the system or accesses the admin console.

    Note: Direct access to this endpoint returns a 401 Unauthorized error.

    How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere?

    Upgrade org.keycloak:keycloak-services to version 26.4.0 or higher.

    [0,26.4.0)
    • L
    Improper Privilege Management

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Privilege Management via improper privilege enforcement in the Fine-Grained Admin Permissions process. An attacker can gain unauthorized administrative access by leveraging a user account with the manage-users role to escalate privileges to realm-admin. This is because policies and permissions share the same table internally.

    Note: It is recommended to use a unique name for the permission; The name must not conflict with any policy name.

    How to fix Improper Privilege Management?

    Upgrade org.keycloak:keycloak-services to version 26.3.0 or higher.

    [,26.3.0)
    • M
    Origin Validation Error

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Origin Validation Error via the review profile process. An attacker can gain unauthorized access to another user's account by initiating an account merge during an identity provider login and modifying their email address to match the victim's, which results in a verification email being sent to the victim. If the victim clicks the verification link, the attacker is able to access the victim's account.

    Note:

    This is only exploitable if IdP is configured in Keycloak and the attacker has access both to a registered Keycloak and identity provider account. Additionally, an attacker would need to know the email or Keycloak username of the victim. Finally, the victim would need to accept the verification link within the 5 minutes that the token is active.

    How to fix Origin Validation Error?

    Upgrade org.keycloak:keycloak-services to version 26.3.0 or higher.

    [,26.3.0)
    • H
    Improper Validation of Certificate with Host Mismatch

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Validation of Certificate with Host Mismatch when setting the verification policy to 'ALL'. This is supposed to skip hostname check but an unintended side effect is skipping trust store certificate verification. An attacker can read sensitive data from the system and perform spoofing or redirection attacks by exploiting this vulnerability.

    Note:

    The ANY mode should not be used in production.

    How to fix Improper Validation of Certificate with Host Mismatch?

    Upgrade org.keycloak:keycloak-services to version 26.2.2 or higher.

    [,26.2.2)
    • M
    Improper Authentication

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Improper Authentication. An attacker can circumvent required actions configured by an administrator such as setting up 2FA by using AIA (Application-initiated actions). If a user account has been required by an administrator to perform a required action, the same user can pass in a URL parameter during the sign in process to exploit this vulnerability.

    How to fix Improper Authentication?

    Upgrade org.keycloak:keycloak-services to version 26.2.2 or higher.

    [,26.2.2)
    • M
    Allocation of Resources Without Limits or Throttling

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when caching JWT tokens, which are not limited in their expiration time. An attacker can cause the consumption of excessive memory by sending malicious JWT tokens.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.keycloak:keycloak-services to version 26.0.11, 26.1.5 or higher.

    [23.0.0,26.0.11)[26.1.0,26.1.5)
    • M
    Incorrect User Management

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Incorrect User Management in oidc/OrganizationMembershipMapper.java, which relies on matching the domain of a user's email address to map them to an organization. A user can make an unauthorized token claim including association with an organization that they are not actually mapped to. If self-registration is enabled and unrestricted, this is easier to exploit.

    How to fix Incorrect User Management?

    Upgrade org.keycloak:keycloak-services to version 26.1.3 or higher.

    [,26.1.3)
    • M
    Exposure of Sensitive Information Through Environmental Variables

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Exposure of Sensitive Information Through Environmental Variables through user-configurable URLs.

    Exploiting this vulnerability is possible with the configuration of backchannel logout URLs or admin URLs, when including placeholders like ${env.VARNAME} or ${PROPNAME}, which are replaced with actual values during URL processing. An attacker can access sensitive server environment variables and system properties.

    How to fix Exposure of Sensitive Information Through Environmental Variables?

    Upgrade org.keycloak:keycloak-services to version 26.0.8 or higher.

    [,26.0.8)
    • M
    Denial of Service (DoS)

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Denial of Service (DoS) by modification of security headers and inserting newlines. An attacker can cause the server to process a terminated request, leading to service failure.

    Note: This is only exploitable if the attacker can change realm settings.

    How to fix Denial of Service (DoS)?

    Upgrade org.keycloak:keycloak-services to version 26.0.8 or higher.

    [,26.0.8)
    • M
    External Control of File Name or Path

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to External Control of File Name or Path. An attacker could read sensitive information from a Vault file that is not within the expected context by exploiting this vulnerability.

    Note:

    This is only exploitable if the attacker has previous high access to the Keycloak server in order to perform resource creation.

    How to fix External Control of File Name or Path?

    Upgrade org.keycloak:keycloak-services to version 26.0.6 or higher.

    [,26.0.6)
    • H
    Regular Expression Denial of Service (ReDoS)

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the SearchQueryUtils method due to improper input sanitization. An attacker could exhaust system resources and achieve denial of service by exploiting this vulnerability.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.keycloak:keycloak-services to version 26.0.6 or higher.

    [,26.0.6)
    • M
    HTTP Request Smuggling

    org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

    Affected versions of this package are vulnerable to HTTP Request Smuggling due to improper handling of proxy headers resulting in costly DNS resolution operations. An attacker could tie up IO threads and potentially cause a denial of service by exploiting these operations.

    Notes:

    1. This is only exploitable if the attacker has access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.

    2. For versions 26.x, this is only exploitable if the realm must have SslRequired=EXTERNAL (the default), HTTP must be enabled, the instance must not be using a full hostname URL, access must come from behind a proxy (assuming the proxy overwrites the X-Forwarded-For header), and trusted proxies must not be set or must incorrectly trust the client from which the request is originating.

    How to fix HTTP Request Smuggling?

    Upgrade org.keycloak:keycloak-services to version 26.0.6 or higher.

    [,26.0.6)