Use of Hard-coded Credentials Affecting org.keycloak:keycloak-quarkus-server package, versions [,26.0.6)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGKEYCLOAK-8400752
  • published 22 Nov 2024
  • disclosed 22 Nov 2024
  • credit Steven Hawkins

How to fix?

Upgrade org.keycloak:keycloak-quarkus-server to version 26.0.6 or higher.

Overview

Affected versions of this package are vulnerable to Use of Hard-coded Credentials due to sensitive runtime values being captured during the build process and embedded as default values in bytecode.

Note:

For versions 26.x, sensitive data specified directly in environment variables during the build process is also stored as a default value, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
8.2 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    Present
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    None
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None