⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Drafts

Create draft to convert the suggestion into a draft security issue that can be edited before publishing.

Dismiss to remove a suggestion from the queue.

CVE-2024-8698
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Keycloak-saml-core: improper verification of saml responses leading to privilege escalation in keycloak

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

keycloak
<25.0.5
eap8-hppc
*
eap8-log4j
*
eap8-slf4j
*
eap8-jctools
*
eap8-jgroups
*
eap8-wildfly
*
eap8-narayana
*
eap8-asyncutil
*
eap8-hibernate
*
eap8-saaj-impl
*
eap8-snakeyaml
*
eap8-apache-cxf
*
eap8-cryptacular
*
eap8-fastinfoset
*
rh-sso7-keycloak
*
eap8-aws-java-sdk
*
eap8-pem-keystore
*
eap8-aesh-readline
*
eap8-jboss-logging
*
eap8-objectweb-asm
*
eap8-artemis-native
*
rhbk/keycloak-rhel9
*
eap8-aesh-extensions
*
eap8-nimbus-jose-jwt
*
eap8-resteasy-spring
*
eap8-activemq-artemis
*
eap8-apache-commons-io
*
eap8-jboss-cert-helper
*
eap8-apache-commons-lang
*
eap8-hibernate-validator
*
eap8-resteasy-extensions
*
eap8-apache-commons-codec
*
eap8-insights-java-client
*
keycloak-saml-core-public
eap8-activemq-artemis-native
*
eap8-eap-product-conf-parent
*
eap8-shibboleth-java-support
*
org.keycloak-keycloak-parent
rhbk/keycloak-rhel9-operator
*
rhbk/keycloak-operator-bundle
*
rh-sso-7/sso76-openshift-rhel8
*
eap8-apache-commons-collections
*
org.keycloak/keycloak-saml-core
eap8-artemis-wildfly-integration
*
eap8-jakarta-servlet-jsp-jstl-api
*
org.keycloak/keycloak-saml-core-public

pkgs.keycloak

Identity and access management for modern applications and services
Package maintainers: 3
CVE-2024-1249
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkloginiframe leads to ddos

A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.

keycloak
<24.0.3
<22.0.10
eap7-netty
*
eap7-wildfly
*
eap7-undertow
*
keycloak-core
eap7-hibernate
*
mta/mta-ui-rhel8
mta/mta-ui-rhel9
rh-sso7-keycloak
*
eap7-glassfish-el
*
eap7-jackson-core
*
rhdh-hub-container
rhbk/keycloak-rhel9
*
rhdh/rhdh-hub-rhel9
eap7-wildfly-elytron
*
eap7-wildfly-openssl
*
eap7-jackson-databind
*
eap7-jboss-ejb-client
*
keycloak-adapter-eap6
eap7-jackson-annotations
*
eap7-wildfly-http-client
*
eap7-jackson-modules-base
*
eap7-jackson-modules-java8
*
eap7-wildfly-naming-client
*
eap7-wildfly-openssl-linux
*
eap7-jboss-server-migration
*
eap7-jackson-jaxrs-providers
*
keycloak-adapter-sso7_2-eap6
keycloak-adapter-sso7_3-eap6
keycloak-adapter-sso7_4-eap6
keycloak-adapter-sso7_5-eap6
org.keycloak-keycloak-parent
rhbk/keycloak-rhel9-operator
*
rhbk/keycloak-operator-bundle
*
rh-sso-7/sso76-openshift-rhel8
*
openshift-serverless-1/logic-rhel8-operator
*
openshift-serverless-1/logic-operator-bundle
*
openshift-serverless-1/logic-swf-builder-rhel8
*
openshift-serverless-1/logic-swf-devmode-rhel8
*
openshift-serverless-1-logic-rhel8-operator-container
*
openshift-serverless-1/logic-data-index-ephemeral-rhel8
*
openshift-serverless-1-logic-swf-builder-rhel8-container
*
openshift-serverless-1-logic-swf-devmode-rhel8-container
*
openshift-serverless-1/logic-data-index-postgresql-rhel8
*
openshift-serverless-1/logic-jobs-service-ephemeral-rhel8
*
openshift-serverless-1/logic-jobs-service-postgresql-rhel8
*
openshift-serverless-1-logic-rhel8-operator-bundle-container
*
openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8
*
openshift-serverless-1-logic-data-index-ephemeral-rhel8-container
*
openshift-serverless-1-logic-data-index-postgresql-rhel8-container
*
openshift-serverless-1-logic-jobs-service-ephemeral-rhel8-container
*
openshift-serverless-1-logic-jobs-service-postgresql-rhel8-container
*
openshift-serverless-1-logic-kn-workflow-cli-artifacts-rhel8-container
*

pkgs.keycloak

Identity and access management for modern applications and services
Package maintainers: 3
CVE-2024-10525
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Eclipse Mosquito: Heap Buffer Overflow in my_subscribe_callback

In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.

mosquitto
=<2.0.18
CVE-2024-45691
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Moodle: lesson activity password bypass through php loose comparison

A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values.

moodle
<4.3.7
<4.4.3
<4.1.13
<4.2.10

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP
Package maintainers: 1
CVE-2024-10573
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Mpg123: buffer overflow when writing decoded pcm samples

An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector.

mpg123
<1.32.8
*
CVE-2024-3935
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Eclipse Mosquito: Double free vulnerability

In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.

mosquitto
=<2.0.18
CVE-2024-3656
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Keycloak: unguarded admin rest api endpoints allows low privilege users to use administrative functionalities

A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.

keycloak
<24.0.5
org.keycloak-keycloak-parent

pkgs.keycloak

Identity and access management for modern applications and services
Package maintainers: 3
CVE-2024-45689
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Moodle: unprotected access to sensitive information via dynamic tables

A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access.

moodle
<4.3.7
<4.4.3
<4.1.13
<4.2.10

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP
Package maintainers: 1
CVE-2024-45690
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Moodle: idor when deleting oauth2 linked accounts

A flaw was found in Moodle. Additional checks were required to ensure users can only delete their OAuth2-linked accounts.

moodle
<4.3.7
<4.4.3
<4.1.13
<4.2.10

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP
Package maintainers: 1
CVE-2024-48897
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 8 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
Moodle: idor in edit/delete rss feed

A vulnerability was found in Moodle. Additional checks are required to ensure users can only edit or delete RSS feeds that they have permission to modify.

moodle
<4.1.14
<4.2.11
<4.4.4
<4.1.0
<4.3.8

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP
Package maintainers: 1