org.wildfly:wildfly-parent@8.2.0.Final vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.wildfly:wildfly-parent package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS). Undertow keeps a cache of seen HTTP headers in persistent connections. This cache can easily be exploited to fill memory with garbage, up to max-headers (default 200) * max-header-size (default 1MB) per active TCP connection.

How to fix Denial of Service (DoS)?

Upgrade org.wildfly:wildfly-parent to version 11.0.0.Beta1 or higher.

[,11.0.0.Beta1)
  • H
Deserialization of Untrusted Data

Affected versions of this package are vulnerable to Deserialization of Untrusted Data in the Enterprise Application Beans (EJB) due to lack of validation/filtering capabilities in wildfly.

How to fix Deserialization of Untrusted Data?

Upgrade org.wildfly:wildfly-parent to version 20.0.0.Final or higher.

[,20.0.0.Final)
  • L
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). While creating a new role in domain mode via the admin console, it is possible to add a payload in the name field.

How to fix Cross-site Scripting (XSS)?

Upgrade org.wildfly:wildfly-parent to version 23.0.2.Final or higher.

[,23.0.2.Final)