Skip to content

Conversation

@rotemplay
Copy link
Contributor

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • embedded-keycloak/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
low severity 40/1000
Why? Confidentiality impact: Low, Integrity impact: None, Availability impact: None, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00207, Social Trends: No, Days since published: 1326, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Low, Package Popularity Score: 99, Impact: 2.35, Likelihood: 1.67, Score Version: V5
Man-in-the-Middle (MitM)
SNYK-JAVA-LOG4J-1300176
org.keycloak:keycloak-core:
23.0.1 -> 23.0.3
No No Known Exploit
medium severity 240/1000
Why? Confidentiality impact: High, Integrity impact: High, Availability impact: High, Scope: Unchanged, Exploit Maturity: Proof of Concept, User Interaction (UI): None, Privileges Required (PR): High, Attack Complexity: High, Attack Vector: Network, EPSS: 0.10004, Social Trends: No, Days since published: 732, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 9.79, Likelihood: 2.45, Score Version: V5
Arbitrary Code Execution
SNYK-JAVA-LOG4J-2316893
org.keycloak:keycloak-core:
23.0.1 -> 23.0.3
No Proof of Concept
high severity 165/1000
Why? Confidentiality impact: High, Integrity impact: High, Availability impact: High, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00443, Social Trends: No, Days since published: 696, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: High, Package Popularity Score: 99, Impact: 9.79, Likelihood: 1.68, Score Version: V5
SQL Injection
SNYK-JAVA-LOG4J-2342645
org.keycloak:keycloak-core:
23.0.1 -> 23.0.3
No No Known Exploit
high severity 166/1000
Why? Confidentiality impact: High, Integrity impact: High, Availability impact: High, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00797, Social Trends: No, Days since published: 696, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: High, Package Popularity Score: 99, Impact: 9.79, Likelihood: 1.69, Score Version: V5
Deserialization of Untrusted Data
SNYK-JAVA-LOG4J-2342646
org.keycloak:keycloak-core:
23.0.1 -> 23.0.3
No No Known Exploit
high severity 166/1000
Why? Confidentiality impact: High, Integrity impact: High, Availability impact: High, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00781, Social Trends: No, Days since published: 696, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: High, Package Popularity Score: 99, Impact: 9.79, Likelihood: 1.69, Score Version: V5
Deserialization of Untrusted Data
SNYK-JAVA-LOG4J-2342647
org.keycloak:keycloak-core:
23.0.1 -> 23.0.3
No No Known Exploit
medium severity 111/1000
Why? Confidentiality impact: None, Integrity impact: None, Availability impact: High, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00089, Social Trends: No, Days since published: 279, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 5.99, Likelihood: 1.84, Score Version: V5
Denial of Service (DoS)
SNYK-JAVA-LOG4J-3358774
org.keycloak:keycloak-core:
23.0.1 -> 23.0.3
No No Known Exploit
critical severity 453/1000
Why? Confidentiality impact: High, Integrity impact: High, Availability impact: High, Scope: Unchanged, Exploit Maturity: Proof of Concept, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: Low, Attack Vector: Network, EPSS: 0.79382, Social Trends: No, Days since published: 1274, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Critical, Package Popularity Score: 99, Impact: 9.79, Likelihood: 4.62, Score Version: V5
Deserialization of Untrusted Data
SNYK-JAVA-LOG4J-572732
org.keycloak:keycloak-core:
23.0.1 -> 23.0.3
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Arbitrary Code Execution
🦉 SQL Injection
🦉 Deserialization of Untrusted Data
🦉 More lessons are available in Snyk Learn

@Fameing Fameing added security Pull requests that address a security vulnerability enhancement labels Dec 18, 2023
@Fameing Fameing merged commit f3f4c44 into develop Dec 18, 2023
@Fameing Fameing deleted the snyk-fix-06135d6b8caae7372d60b8bb079688dd branch December 18, 2023 17:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement security Pull requests that address a security vulnerability

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants