6
CVE-2023-6717
- EPSS 0.09%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 21.11.2024 08:44:24
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
≫
Paket
keycloak
Default Statusunaffected
Version <
22.0.10
Version
0
Status
affected
Version <
24.0.3
Version
24.0.0
Status
affected
HerstellerRed Hat
≫
Produkt
Red Hat AMQ Broker 7
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Keycloak 22
Default Statusaffected
Version <
*
Version
22.0.10-1
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Keycloak 22
Default Statusaffected
Version <
*
Version
22-13
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Keycloak 22
Default Statusaffected
Version <
*
Version
22-16
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Keycloak 22.0.10
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-3
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHOSS-1.33-RHEL-8
Default Statusaffected
Version <
*
Version
1.33.0-5
Status
unaffected
HerstellerRed Hat
≫
Produkt
RHPAM 7.13.5 async
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Migration Toolkit for Applications 6
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Migration Toolkit for Applications 7
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Apicurio Registry 2
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat build of Quarkus
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat Data Grid 8
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Decision Manager 7
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Developer Hub
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat Fuse 7
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Data Grid 7
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Enterprise Application Platform 6
Default Statusunknown
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Enterprise Application Platform 6
Default Statusunknown
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Enterprise Application Platform 6
Default Statusunknown
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Enterprise Application Platform 7
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Enterprise Application Platform 8
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Enterprise Application Platform Expansion Pack
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift GitOps
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Process Automation 7
Default Statusaffected
HerstellerRed Hat
≫
Produkt
Red Hat Single Sign-On 7
Default Statusaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.258 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 6 | 0.5 | 5.5 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.