org.wildfly:wildfly-parent@8.0.0.Final vulnerabilities

  • latest version

    34.0.1.Final

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.wildfly:wildfly-parent package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    Affected versions of this package are vulnerable to Denial of Service (DoS). Undertow keeps a cache of seen HTTP headers in persistent connections. This cache can easily be exploited to fill memory with garbage, up to max-headers (default 200) * max-header-size (default 1MB) per active TCP connection.

    How to fix Denial of Service (DoS)?

    Upgrade org.wildfly:wildfly-parent to version 11.0.0.Beta1 or higher.

    [,11.0.0.Beta1)
    • H
    Deserialization of Untrusted Data

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data in the Enterprise Application Beans (EJB) due to lack of validation/filtering capabilities in wildfly.

    How to fix Deserialization of Untrusted Data?

    Upgrade org.wildfly:wildfly-parent to version 20.0.0.Final or higher.

    [,20.0.0.Final)
    • L
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). While creating a new role in domain mode via the admin console, it is possible to add a payload in the name field.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.wildfly:wildfly-parent to version 23.0.2.Final or higher.

    [,23.0.2.Final)