Use of Hard-coded Credentials Affecting org.keycloak:keycloak-quarkus-server package, versions [,26.0.6)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGKEYCLOAK-8400752
- published 22 Nov 2024
- disclosed 22 Nov 2024
- credit Steven Hawkins
Introduced: 22 Nov 2024
New CVE-2024-10451 Open this link in a new tabHow to fix?
Upgrade org.keycloak:keycloak-quarkus-server
to version 26.0.6 or higher.
Overview
Affected versions of this package are vulnerable to Use of Hard-coded Credentials due to sensitive runtime values being captured during the build process and embedded as default values in bytecode
.
Note:
For versions 26.x, sensitive data specified directly in environment variables during the build process is also stored as a default value, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper
logic, capturing sensitive data as default values.