Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[Snyk] Security upgrade org.keycloak:keycloak-core from 17.0.1 to 23.0.5 #983

Closed
wants to merge 1 commit into from

Conversation

st3v0rr
Copy link
Member

@st3v0rr st3v0rr commented Jan 29, 2024

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • contrib/custom-representations/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Man-in-the-Middle (MitM)
SNYK-JAVA-LOG4J-1300176
org.keycloak:keycloak-core:
17.0.1 -> 23.0.5
Yes No Known Exploit
medium severity 651/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.6
Arbitrary Code Execution
SNYK-JAVA-LOG4J-2316893
org.keycloak:keycloak-core:
17.0.1 -> 23.0.5
Yes Proof of Concept
high severity 619/1000
Why? Has a fix available, CVSS 8.1
SQL Injection
SNYK-JAVA-LOG4J-2342645
org.keycloak:keycloak-core:
17.0.1 -> 23.0.5
Yes No Known Exploit
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-LOG4J-2342646
org.keycloak:keycloak-core:
17.0.1 -> 23.0.5
Yes No Known Exploit
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Deserialization of Untrusted Data
SNYK-JAVA-LOG4J-2342647
org.keycloak:keycloak-core:
17.0.1 -> 23.0.5
Yes No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-LOG4J-3358774
org.keycloak:keycloak-core:
17.0.1 -> 23.0.5
Yes No Known Exploit
critical severity 811/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.8
Deserialization of Untrusted Data
SNYK-JAVA-LOG4J-572732
org.keycloak:keycloak-core:
17.0.1 -> 23.0.5
Yes Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Arbitrary Code Execution
🦉 SQL Injection
🦉 Deserialization of Untrusted Data
🦉 More lessons are available in Snyk Learn

Copy link

Quality Gate Passed Quality Gate passed

Kudos, no new issues were introduced!

0 New issues
0 Security Hotspots
No data about Coverage
0.0% Duplication on New Code

See analysis details on SonarCloud

@st3v0rr st3v0rr closed this Feb 26, 2024
@jonasvoelcker jonasvoelcker deleted the snyk-fix-eb9f649d980314f54110ee1047ce2c3e branch June 3, 2024 16:59
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants