daniel-brown-ws-test / verademo

A deliberately insecure Java web application
MIT License
0 stars 0 forks source link

CVE-2022-2668 (High) detected in keycloak-saml-core-2.5.5.Final.jar #370

Open whitesource-app-bolt-danbrown[bot] opened 1 year ago

whitesource-app-bolt-danbrown[bot] commented 1 year ago

CVE-2022-2668 - High Severity Vulnerability

Vulnerable Library - keycloak-saml-core-2.5.5.Final.jar

Keycloak SSO

Library home page: http://keycloak.org

Path to dependency file: /app/pom.xml

Path to vulnerable library: /cloak-saml-core/2.5.5.Final/keycloak-saml-core-2.5.5.Final.jar

Dependency Hierarchy: - :x: **keycloak-saml-core-2.5.5.Final.jar** (Vulnerable Library)

Found in HEAD commit: 93ec43e511ee189f3bf2254c555dfd88253afa89

Found in base branch: main

Vulnerability Details

An issue was discovered in Keycloak that allows arbitrary Javascript to be uploaded for the SAML protocol mapper even if the UPLOAD_SCRIPTS feature is disabled

Publish Date: 2022-08-05

URL: CVE-2022-2668

CVSS 3 Score Details (7.2)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-wf7g-7h6h-678v

Release Date: 2022-08-05

Fix Resolution: org.keycloak:keycloak-saml-core:19.0.2