Vulnerabilities in Quarkus #29579
Replies: 4 comments 4 replies
-
@fraserisverycool Hi, these are new Keycloak CVEs, such as GHSA-75p6-52g3-rqc8. You can consider it be false-positives from the Quarkus perspective - these are server-side scoped CVEs which are activated when Keycloak is invoked, example, requested to exchange a token as in the case of GHSA-75p6-52g3-rqc8. HTH |
Beta Was this translation helpful? Give feedback.
-
The problem is that the tool you are using sees Just have a look at the column with the values starting with We had this reported numerous times and we also reported the problems to this particular security tooling but they haven't improved on that yet. We can't do anything about it on our side as it's a tooling problem. So whenever you see that, have a look at the components mentioned and that should help you filter false positives. |
Beta Was this translation helpful? Give feedback.
-
Hi @gsmet, the cpe lines related to Keycloak might be just a noise, indeed, but there is a Quarkus CPE there, I tried the other day with the 7.1.1 version and it was all clear for some DB issues which previously were confused as Quarkus issues. |
Beta Was this translation helpful? Give feedback.
-
FYI, running OWASP plugin 7.4.3 against this extension on |
Beta Was this translation helpful? Give feedback.
-
Hello, first time writing here. We've added an owasp dependency checker to our Quarkus project and it tells us that Quarkus has a number of dependencies which fail the check due to multiple critical CVEs. Here is an example:
quarkus-keycloak-authorization-2.14.2, which uses redhat:keycloak:2.14.2, which has multiple CVEs, for example CVE-2022-1245
Is there anything I can do to mitigate these? Are they reported somewhere on the Quarkus website? Any advice is welcome!
Beta Was this translation helpful? Give feedback.
All reactions