Search for packages
| purl | pkg:maven/org.wildfly.security/wildfly-elytron@1.11.0.CR4 |
| Next non-vulnerable version | 1.15.15.Final |
| Latest non-vulnerable version | 2.6.2.Final |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6ssa-j1q1-c3cs
Aliases: CVE-2022-3143 GHSA-jmj6-p2j9-68cp |
Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses `java.util.Arrays.equals` in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use `java.security.MessageDigest.isEqual` instead. This flaw allows an attacker to access secure information or impersonate an authed user. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-99vp-bk8n-q3cp
Aliases: CVE-2020-10714 GHSA-7fhr-2694-rg79 |
Session Fixation A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||