Show filters
57 Total Results
Displaying 11-20 of 57
Sort by:
Attacker Value
Unknown

CVE-2023-1108

Disclosure Date: September 14, 2023 (last updated May 03, 2024)
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
Attacker Value
Unknown

CVE-2023-1664

Disclosure Date: May 26, 2023 (last updated October 08, 2023)
A flaw was found in Keycloak. This flaw depends on a non-default configuration "Revalidate Client Certificate" to be enabled and the reverse proxy is not validating the certificate before Keycloak. Using this method an attacker may choose the certificate which will be validated by the server. If this happens and the KC_SPI_TRUSTSTORE_FILE_FILE variable is missing/misconfigured, any trustfile may be accepted with the logging information of "Cannot validate client certificate trust: Truststore not available". This may not impact availability as the attacker would have no access to the server, but consumer applications Integrity or Confidentiality may be impacted considering a possible access to them. Considering the environment is correctly set to use "Revalidate Client Certificate" this flaw is avoidable.
Attacker Value
Unknown

CVE-2022-2237

Disclosure Date: March 27, 2023 (last updated October 08, 2023)
A flaw was found in the Keycloak Node.js Adapter. This flaw allows an attacker to benefit from an Open Redirect vulnerability in the checkSso function.
Attacker Value
Unknown

CVE-2022-4492

Disclosure Date: February 23, 2023 (last updated October 08, 2023)
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Attacker Value
Unknown

CVE-2022-1278

Disclosure Date: September 13, 2022 (last updated October 08, 2023)
A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.
Attacker Value
Unknown

CVE-2022-2256

Disclosure Date: September 01, 2022 (last updated October 08, 2023)
A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality.
Attacker Value
Unknown

CVE-2022-2764

Disclosure Date: September 01, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.
Attacker Value
Unknown

CVE-2022-1319

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
Attacker Value
Unknown

CVE-2022-1259

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629.
Attacker Value
Unknown

CVE-2022-0225

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack.