Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/13894?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13894?format=api", "vulnerability_id": "VCID-zp22-a33x-bqfq", "summary": "Duplicate Advisory: Keycloak Session Fixation vulnerability\n# Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-5rxp-2rhr-qwqv. This link is maintained to preserve external references.\n\n# Original Description\nA session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when `the turnOffChangeSessionIdOnLogin` option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation.", "aliases": [ { "alias": "GHSA-j76j-rqwj-jmvv" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/42271?format=api", "purl": "pkg:maven/org.keycloak/keycloak-services@25.0.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dgp-xdrz-q7dv" }, { "vulnerability": "VCID-5f8r-n4mm-y3g6" }, { "vulnerability": "VCID-5vwq-aqk5-nkh9" }, { "vulnerability": "VCID-5zh4-963a-q3gp" }, { "vulnerability": "VCID-6hy1-r23s-cbhy" }, { "vulnerability": "VCID-6n3p-8y8x-bbfc" }, { "vulnerability": "VCID-7c1j-kcbb-v3f1" }, { "vulnerability": "VCID-auwb-hcuv-gygf" }, { "vulnerability": "VCID-bhrr-nn9f-7udu" }, { "vulnerability": "VCID-by72-dvnw-m3gu" }, { "vulnerability": "VCID-c11x-8jte-fuds" }, { "vulnerability": "VCID-cdsa-wmby-ebbq" }, { "vulnerability": "VCID-cf37-8d6y-r3d5" }, { "vulnerability": "VCID-d2rd-6u56-yfd8" }, { "vulnerability": "VCID-d6ku-ys87-cqh4" }, { "vulnerability": "VCID-e4ub-v4ef-affb" }, { "vulnerability": "VCID-gn2j-ra6w-r3et" }, { "vulnerability": "VCID-gnxr-2t9g-4ye4" }, { "vulnerability": "VCID-gzz6-md9v-b3em" }, { "vulnerability": "VCID-k4xv-x1pt-guce" }, { "vulnerability": "VCID-m3uj-4mag-kbf2" }, { "vulnerability": "VCID-mdkf-3bgs-w7dm" }, { "vulnerability": "VCID-mku9-3bpp-aqbk" }, { "vulnerability": "VCID-nxhc-rp71-hbdk" }, { "vulnerability": "VCID-pjgz-fa5h-tkfh" }, { "vulnerability": "VCID-qgbq-s33g-d7af" }, { "vulnerability": "VCID-szbr-v2vq-3kbn" }, { "vulnerability": "VCID-tc9b-zzjt-63c7" }, { "vulnerability": "VCID-ugtk-3bjv-s3a4" }, { "vulnerability": "VCID-uuf2-u7xh-uuef" }, { "vulnerability": "VCID-v77w-st1u-pfe6" }, { "vulnerability": "VCID-ver5-9t6m-c3ef" }, { "vulnerability": "VCID-vstv-ec14-quc5" }, { "vulnerability": "VCID-w5f1-xryr-fucq" }, { "vulnerability": "VCID-x4aw-v76q-vbdc" }, { "vulnerability": "VCID-xd7x-aevv-cfcp" }, { "vulnerability": "VCID-xfnw-15sz-zyfr" }, { "vulnerability": "VCID-y1h3-yyn9-53fr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.keycloak/keycloak-services@25.0.5" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/61796?format=api", "purl": "pkg:maven/org.keycloak/keycloak-services@23.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dgp-xdrz-q7dv" }, { "vulnerability": "VCID-2dgt-7k4f-fyce" }, { "vulnerability": "VCID-3sh8-6vsc-1uae" }, { "vulnerability": "VCID-41hy-n7tz-3bee" }, { "vulnerability": "VCID-5f8r-n4mm-y3g6" }, { "vulnerability": "VCID-5vwq-aqk5-nkh9" }, { "vulnerability": "VCID-5zh4-963a-q3gp" }, { "vulnerability": "VCID-6hy1-r23s-cbhy" }, { "vulnerability": "VCID-6n3p-8y8x-bbfc" }, { "vulnerability": "VCID-7c1j-kcbb-v3f1" }, { "vulnerability": "VCID-91gs-k267-3kbq" }, { "vulnerability": "VCID-9wzh-7ych-y7c6" }, { "vulnerability": "VCID-ajcu-s4zn-63cn" }, { "vulnerability": "VCID-auwb-hcuv-gygf" }, { "vulnerability": "VCID-bhrr-nn9f-7udu" }, { "vulnerability": "VCID-by72-dvnw-m3gu" }, { "vulnerability": "VCID-c11x-8jte-fuds" }, { "vulnerability": "VCID-cdsa-wmby-ebbq" }, { "vulnerability": "VCID-cf37-8d6y-r3d5" }, { "vulnerability": "VCID-cgf7-vbkd-cua6" }, { "vulnerability": "VCID-d2rd-6u56-yfd8" }, { "vulnerability": "VCID-d6ku-ys87-cqh4" }, { "vulnerability": "VCID-e4ub-v4ef-affb" }, { "vulnerability": "VCID-ezqk-pyhr-5ffj" }, { "vulnerability": "VCID-gn2j-ra6w-r3et" }, { "vulnerability": "VCID-gnxr-2t9g-4ye4" }, { "vulnerability": "VCID-gzz6-md9v-b3em" }, { "vulnerability": "VCID-htax-rbrs-mbdu" }, { "vulnerability": "VCID-j4ar-u2rr-qkfu" }, { "vulnerability": "VCID-ju1d-vwgb-bqbn" }, { "vulnerability": "VCID-k4xv-x1pt-guce" }, { "vulnerability": "VCID-m3uj-4mag-kbf2" }, { "vulnerability": "VCID-mdkf-3bgs-w7dm" }, { "vulnerability": "VCID-mku9-3bpp-aqbk" }, { "vulnerability": "VCID-n76a-pfh2-57bn" }, { "vulnerability": "VCID-nxhc-rp71-hbdk" }, { "vulnerability": "VCID-pjgz-fa5h-tkfh" }, { "vulnerability": "VCID-qgbq-s33g-d7af" }, { "vulnerability": "VCID-rrkd-31d4-9yaq" }, { "vulnerability": "VCID-sgbm-r5mm-sbbx" }, { "vulnerability": "VCID-szbr-v2vq-3kbn" }, { "vulnerability": "VCID-tc9b-zzjt-63c7" }, { "vulnerability": "VCID-ugtk-3bjv-s3a4" }, { "vulnerability": "VCID-uuf2-u7xh-uuef" }, { "vulnerability": "VCID-v77w-st1u-pfe6" }, { "vulnerability": "VCID-v7r6-3873-77dc" }, { "vulnerability": "VCID-ver5-9t6m-c3ef" }, { "vulnerability": "VCID-vstv-ec14-quc5" }, { "vulnerability": "VCID-w5f1-xryr-fucq" }, { "vulnerability": "VCID-whsx-d6an-hkdm" }, { "vulnerability": "VCID-x4aw-v76q-vbdc" }, { "vulnerability": "VCID-xd7x-aevv-cfcp" }, { "vulnerability": "VCID-xfnw-15sz-zyfr" }, { "vulnerability": "VCID-y1h3-yyn9-53fr" }, { "vulnerability": "VCID-ysyw-rgyv-bkhj" }, { "vulnerability": "VCID-z2bw-n4x2-a7gj" }, { "vulnerability": "VCID-zp22-a33x-bqfq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.keycloak/keycloak-services@23.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/146162?format=api", "purl": "pkg:maven/org.keycloak/keycloak-services@25.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dgp-xdrz-q7dv" }, { "vulnerability": "VCID-5f8r-n4mm-y3g6" }, { "vulnerability": "VCID-5vwq-aqk5-nkh9" }, { "vulnerability": "VCID-5zh4-963a-q3gp" }, { "vulnerability": "VCID-6hy1-r23s-cbhy" }, { "vulnerability": "VCID-6n3p-8y8x-bbfc" }, { "vulnerability": "VCID-7c1j-kcbb-v3f1" }, { "vulnerability": "VCID-auwb-hcuv-gygf" }, { "vulnerability": "VCID-bhrr-nn9f-7udu" }, { "vulnerability": "VCID-by72-dvnw-m3gu" }, { "vulnerability": "VCID-c11x-8jte-fuds" }, { "vulnerability": "VCID-cdsa-wmby-ebbq" }, { "vulnerability": "VCID-cf37-8d6y-r3d5" }, { "vulnerability": "VCID-d2rd-6u56-yfd8" }, { "vulnerability": "VCID-d6ku-ys87-cqh4" }, { "vulnerability": "VCID-e4ub-v4ef-affb" }, { "vulnerability": "VCID-ezqk-pyhr-5ffj" }, { "vulnerability": "VCID-gn2j-ra6w-r3et" }, { "vulnerability": "VCID-gnxr-2t9g-4ye4" }, { "vulnerability": "VCID-gzz6-md9v-b3em" }, { "vulnerability": "VCID-k4xv-x1pt-guce" }, { "vulnerability": "VCID-m3uj-4mag-kbf2" }, { "vulnerability": "VCID-mdkf-3bgs-w7dm" }, { "vulnerability": "VCID-mku9-3bpp-aqbk" }, { "vulnerability": "VCID-nxhc-rp71-hbdk" }, { "vulnerability": "VCID-pjgz-fa5h-tkfh" }, { "vulnerability": "VCID-qgbq-s33g-d7af" }, { "vulnerability": "VCID-szbr-v2vq-3kbn" }, { "vulnerability": "VCID-tc9b-zzjt-63c7" }, { "vulnerability": "VCID-ugtk-3bjv-s3a4" }, { "vulnerability": "VCID-uuf2-u7xh-uuef" }, { "vulnerability": "VCID-v77w-st1u-pfe6" }, { "vulnerability": "VCID-ver5-9t6m-c3ef" }, { "vulnerability": "VCID-vstv-ec14-quc5" }, { "vulnerability": "VCID-w5f1-xryr-fucq" }, { "vulnerability": "VCID-x4aw-v76q-vbdc" }, { "vulnerability": "VCID-xd7x-aevv-cfcp" }, { "vulnerability": "VCID-xfnw-15sz-zyfr" }, { "vulnerability": "VCID-y1h3-yyn9-53fr" }, { "vulnerability": "VCID-ysyw-rgyv-bkhj" }, { "vulnerability": "VCID-zp22-a33x-bqfq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.keycloak/keycloak-services@25.0.0" } ], "references": [ { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6493", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6494", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6495", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6497", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6499", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6500", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6501", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6502", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6503", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6503" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-7341", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-7341" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302064", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302064" }, { "reference_url": "https://github.com/keycloak/keycloak", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/keycloak/keycloak" }, { "reference_url": "https://github.com/keycloak/keycloak/commit/2341d6ee7a3567c58fd6a04a419fe4403e13374c", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/keycloak/keycloak/commit/2341d6ee7a3567c58fd6a04a419fe4403e13374c" }, { "reference_url": "https://github.com/keycloak/keycloak/commit/5b3de0c7e7f367103affe2f5167913a2ce021cf1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/keycloak/keycloak/commit/5b3de0c7e7f367103affe2f5167913a2ce021cf1" }, { "reference_url": "https://github.com/keycloak/keycloak/commit/5e06da2f6794c695051605e26a01affa3a18f66b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/keycloak/keycloak/commit/5e06da2f6794c695051605e26a01affa3a18f66b" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7341", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7341" }, { "reference_url": "https://github.com/advisories/GHSA-j76j-rqwj-jmvv", "reference_id": "GHSA-j76j-rqwj-jmvv", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-j76j-rqwj-jmvv" } ], "weaknesses": [ { "cwe_id": 384, "name": "Session Fixation", "description": "Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." } ], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": "0.5", "weighted_severity": "8.0", "risk_score": 4.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zp22-a33x-bqfq" }