Snyk - Open Source Security

Snyk test report

October 5th 2025, 12:22:07 am (UTC+00:00)

Scanned the following paths:
  • ghcr.io/dexidp/dex:v2.43.0/dexidp/dex (apk)
  • ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4//usr/local/bin/gomplate (gomodules)
  • ghcr.io/dexidp/dex:v2.43.0/dexidp/dex//usr/local/bin/docker-entrypoint (gomodules)
  • ghcr.io/dexidp/dex:v2.43.0/dexidp/dex//usr/local/bin/dex (gomodules)
29 known vulnerabilities
56 vulnerable dependency paths
1131 dependencies

Allocation of Resources Without Limits or Throttling

high severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Vulnerable module: golang.org/x/oauth2/jws
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and golang.org/x/oauth2/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* golang.org/x/oauth2/[email protected]

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to improper parsing of malformed tokens which can lead to memory consumption.

Remediation

Upgrade golang.org/x/oauth2/jws to version 0.27.0 or higher.

References


Server-side Request Forgery (SSRF)

high severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Vulnerable module: golang.org/x/net/http/httpproxy
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and golang.org/x/net/http/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* golang.org/x/net/http/[email protected]

Overview

golang.org/x/net/http/httpproxy is a package for HTTP proxy determination based on environment variables, as provided by net/http's ProxyFromEnvironment function

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in proxy.go, because hostname matching against proxy patterns may treat an IPv6 zone ID as a hostname component. An environment variable value like *.example.com could be matched to a request intended for [::1%25.example.com]:80.

Remediation

Upgrade golang.org/x/net/http/httpproxy to version 0.36.0 or higher.

References


Improper Handling of Unexpected Data Type

high severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Vulnerable module: golang.org/x/crypto/ssh/agent
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and golang.org/x/crypto/ssh/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* golang.org/x/crypto/ssh/[email protected]

Overview

Affected versions of this package are vulnerable to Improper Handling of Unexpected Data Type when functions including List() and SignWithFlags() process *successAgentMsg. This can be triggered by a malicious agent sending a single 0x06 byte (SSH_AGENT_SUCCESS), which is unmarshalled into a *successAgentMsg, causing a panic and client crash.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

A fix was pushed into the master branch but not yet published.

References


Allocation of Resources Without Limits or Throttling

high severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Vulnerable module: golang.org/x/crypto/ssh
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and golang.org/x/crypto/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* golang.org/x/crypto/[email protected]

Overview

golang.org/x/crypto/ssh is a SSH client and server

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in handshakeTransport in handshake.go. An internal queue gets populated with received packets during the key exchange process, while waiting for the client to send a SSH_MSG_KEXINIT. An attacker can cause the server to become unresponsive to new connections by delaying or withholding this message, or by causing the queue to consume all available memory.

Remediation

Upgrade golang.org/x/crypto/ssh to version 0.35.0 or higher.

References


Asymmetric Resource Consumption (Amplification)

high severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Vulnerable module: github.com/golang-jwt/jwt/v5
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/golang-jwt/jwt/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/golang-jwt/jwt/[email protected]

Overview

Affected versions of this package are vulnerable to Asymmetric Resource Consumption (Amplification) through the parse.ParseUnverified function. An attacker can cause excessive memory allocation by sending a crafted request with many period characters in the Authorization header.

Remediation

Upgrade github.com/golang-jwt/jwt/v5 to version 5.2.2 or higher.

References


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/vault/api
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/vault/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/vault/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/serf/coordinate
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/serf/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/serf/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/dexidp/dex /usr/local/bin/dex
  • Package Manager: golang
  • Module: github.com/hashicorp/hcl/v2
  • Introduced through: github.com/dexidp/dex@* and github.com/hashicorp/hcl/[email protected]

Detailed paths

  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/[email protected]
  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/v2/ext/[email protected]
  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/v2/ext/[email protected]
  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/v2/[email protected]
  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/v2/[email protected]
  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/v2/[email protected]
  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/v2/[email protected]
  • Introduced through: github.com/dexidp/dex@* github.com/hashicorp/hcl/v2/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/hcl
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/hcl/hcl/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/golang-lru/simplelru
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/golang-lru/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/golang-lru/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-uuid
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-sockaddr
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/go-sockaddr/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-secure-stdlib/strutil
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/go-secure-stdlib/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/go-secure-stdlib/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-secure-stdlib/parseutil
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/go-secure-stdlib/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/go-secure-stdlib/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-secure-stdlib/awsutil
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/go-secure-stdlib/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/go-secure-stdlib/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-rootcerts
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-retryablehttp
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-multierror
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-immutable-radix
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/go-cleanhttp
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/errwrap
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/hashicorp/consul/api
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/consul/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/consul/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Module: github.com/gosimple/slug
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/gosimple/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/gosimple/[email protected]

MPL-2.0 license


MPL-2.0 license

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/dexidp/dex /usr/local/bin/dex
  • Package Manager: golang
  • Module: github.com/go-sql-driver/mysql
  • Introduced through: github.com/dexidp/dex@* and github.com/go-sql-driver/[email protected]

Detailed paths

  • Introduced through: github.com/dexidp/dex@* github.com/go-sql-driver/[email protected]

MPL-2.0 license


Allocation of Resources Without Limits or Throttling

medium severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Vulnerable module: github.com/go-jose/go-jose/v4
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/go-jose/go-jose/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/go-jose/go-jose/[email protected]

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the use of strings.Split to split JWT tokens. An attacker can cause memory exhaustion and service disruption by sending numerous malformed tokens with a large number of . characters.

Workaround

This vulnerability can be mitigated by pre-validating that payloads passed to Go JOSE do not contain an excessive number of . characters.

Remediation

Upgrade github.com/go-jose/go-jose/v4 to version 4.0.5 or higher.

References


CVE-2025-9230

low severity


Detailed paths


NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.

Remediation

Upgrade Alpine:3.21 openssl to version 3.3.5-r0 or higher.

References


CVE-2025-9231

low severity


Detailed paths


NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker..

While remote key recovery over a network was not attempted by the reporter, timing measurements revealed a timing signal which may allow such an attack.

OpenSSL does not directly support certificates with SM2 keys in TLS, and so this CVE is not relevant in most TLS contexts. However, given that it is possible to add support for such certificates via a custom provider, coupled with the fact that in such a custom provider context the private key may be recoverable via remote timing measurements, we consider this to be a Moderate severity issue.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as SM2 is not an approved algorithm.

Remediation

Upgrade Alpine:3.21 openssl to version 3.3.5-r0 or higher.

References


CVE-2025-9232

low severity


Detailed paths


NVD Description

Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address.

Impact summary: An out-of-bounds read can trigger a crash which leads to Denial of Service for an application.

The OpenSSL HTTP client API functions can be used directly by applications but they are also used by the OCSP client functions and CMP (Certificate Management Protocol) client implementation in OpenSSL. However the URLs used by these implementations are unlikely to be controlled by an attacker.

In this vulnerable code the out of bounds read can only trigger a crash. Furthermore the vulnerability requires an attacker-controlled URL to be passed from an application to the OpenSSL function and the user has to have a 'no_proxy' environment variable set. For the aforementioned reasons the issue was assessed as Low severity.

The vulnerable code was introduced in the following patch releases: 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the HTTP client implementation is outside the OpenSSL FIPS module boundary.

Remediation

Upgrade Alpine:3.21 openssl to version 3.3.5-r0 or higher.

References


Synchronous Access of Remote Resource without Timeout

low severity

  • Manifest file: ghcr.io/dexidp/dex:v2.43.0/hairyhenderson/gomplate/v4 /usr/local/bin/gomplate
  • Package Manager: golang
  • Vulnerable module: github.com/hashicorp/vault/api
  • Introduced through: github.com/hairyhenderson/gomplate/v4@* and github.com/hashicorp/vault/[email protected]

Detailed paths

  • Introduced through: github.com/hairyhenderson/gomplate/v4@* github.com/hashicorp/vault/[email protected]

Overview

Affected versions of this package are vulnerable to Synchronous Access of Remote Resource without Timeout via the rekey and recovery key operations. An attacker can disrupt service availability by triggering uncontrolled cancellation actions during these processes, which can lead to denial of service.

Remediation

Upgrade github.com/hashicorp/vault/api to version 1.20.0 or higher.

References