Use of Hard-coded Constants Affecting org.keycloak:keycloak-services package, versions [,8.0.0)
Threat Intelligence
EPSS
0.24% (63rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGKEYCLOAK-540954
- published 8 Jan 2020
- disclosed 7 Jan 2020
- credit Unknown
Introduced: 7 Jan 2020
CVE-2019-14837 Open this link in a new tabHow to fix?
Upgrade org.keycloak:keycloak-services
to version 8.0.0 or higher.
Overview
org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.
Affected versions of this package are vulnerable to Use of Hard-coded Constants. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
References
CVSS Scores
version 3.1