labsai / EDDI

Prompt & Conversation Management Middleware for Conversational AI APIs such as OpenAI ChatGPT, Facebook Hugging Face, Anthropic Claude, Google Gemini and Ollama. Lean, restful, scalable, and cloud-native. Developed in Java, powered by Quarkus, provided with Docker, and orchestrated with Kubernetes or Openshift.
https://eddi.labs.ai
257 stars 93 forks source link

quarkus-keycloak-authorization-3.11.0.jar: 1 vulnerabilities (highest severity is: 7.1) - autoclosed #366

Closed mend-bolt-for-github[bot] closed 5 months ago

mend-bolt-for-github[bot] commented 5 months ago
Vulnerable Library - quarkus-keycloak-authorization-3.11.0.jar

Path to dependency file: /pom.xml

Path to vulnerable library: /pom.xml

Found in HEAD commit: 1c04518567e3f436111deff61a7003098fbf0c12

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (quarkus-keycloak-authorization version) Remediation Possible**
CVE-2024-2419 High 7.1 keycloak-common-23.0.7.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-2419 ### Vulnerable Library - keycloak-common-23.0.7.jar

Common library and dependencies shared with server and all adapters

Library home page: http://keycloak.org

Path to dependency file: /pom.xml

Path to vulnerable library: /pom.xml

Dependency Hierarchy: - quarkus-keycloak-authorization-3.11.0.jar (Root Library) - keycloak-core-23.0.7.jar - :x: **keycloak-common-23.0.7.jar** (Vulnerable Library)

Found in HEAD commit: 1c04518567e3f436111deff61a7003098fbf0c12

Found in base branch: main

### Vulnerability Details

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other users. It is very similar to CVE-2023-6291.

Publish Date: 2024-04-17

URL: CVE-2024-2419

### CVSS 3 Score Details (7.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-2419

Release Date: 2024-04-17

Fix Resolution: org.keycloak:keycloak-services:22.0.10,24.0.3, org.keycloak:keycloak-common:22.0.10,24.0.3

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
mend-bolt-for-github[bot] commented 5 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.