Search for packages
purl | pkg:maven/org.keycloak/keycloak-ldap-federation@1.0-beta-4 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-9vve-ap5z-ducc
Aliases: GHSA-m3hp-8546-5qmr |
Duplicate Advisory: Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-2p82-5wwr-43cw. This link is maintained to preserve external references. # Original Description A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions. |
Affected by 0 other vulnerabilities. |
VCID-bnfj-v32k-gkc9
Aliases: CVE-2022-2232 GHSA-8hc5-rmgf-qx6p |
Keycloak vulnerable to LDAP Injection on UsernameForm Login A flaw was found in the Keycloak package. This flaw allows an attacker to benefit from an LDAP query and access existing usernames in the server. |
Affected by 1 other vulnerability. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-08-01T12:09:09.821549+00:00 | GitLab Importer | Affected by | VCID-9vve-ap5z-ducc | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-ldap-federation/GHSA-m3hp-8546-5qmr.yml | 37.0.0 |
2025-08-01T11:26:53.215974+00:00 | GitLab Importer | Affected by | VCID-bnfj-v32k-gkc9 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-ldap-federation/CVE-2022-2232.yml | 37.0.0 |