You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
Path to dependency file: /pom.xml
Path to vulnerable library: /pom.xml
Found in HEAD commit: 59403f1cfff628956549b34b2abc1fc6294ce3b4
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - keycloak-authz-client-26.0.3.jar
KeyCloak AuthZ: Client API
Library home page: https://keycloak.org
Path to dependency file: /pom.xml
Path to vulnerable library: /pom.xml
Dependency Hierarchy:
Found in HEAD commit: 59403f1cfff628956549b34b2abc1fc6294ce3b4
Found in base branch: main
Vulnerability Details
A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
Publish Date: 2025-01-14
URL: CVE-2024-11736
CVSS 3 Score Details (4.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-f4v7-3mww-9gc2
Release Date: 2025-01-14
Fix Resolution: org.keycloak:keycloak-saml-adapter-core:26.0.8;org.keycloak:keycloak-saml-adapter-core-jakarta:26.0.8;org.keycloak:keycloak-common:26.0.8;org.keycloak:keycloak-services:26.0.8;org.keycloak:keycloak-saml-core:26.0.8;org.keycloak:keycloak-model-jpa:26.0.8;org.keycloak:keycloak-core:26.0.8
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: