6

CVE-2023-6717

A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/keycloak/keycloak
Paket keycloak
Default Statusunaffected
Version < 22.0.10
Version 0
Status affected
Version < 24.0.3
Version 24.0.0
Status affected
HerstellerRed Hat
Produkt Red Hat AMQ Broker 7
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version < *
Version 22.0.10-1
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version < *
Version 22-13
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22
Default Statusaffected
Version < *
Version 22-16
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 22.0.10
Default Statusunaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-3
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHOSS-1.33-RHEL-8
Default Statusaffected
Version < *
Version 1.33.0-5
Status unaffected
HerstellerRed Hat
Produkt RHPAM 7.13.5 async
Default Statusunaffected
HerstellerRed Hat
Produkt Migration Toolkit for Applications 6
Default Statusaffected
HerstellerRed Hat
Produkt Migration Toolkit for Applications 7
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat build of Apicurio Registry 2
Default Statusaffected
HerstellerRed Hat
Produkt Red Hat build of Quarkus
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat Data Grid 8
Default Statusaffected
HerstellerRed Hat
Produkt Red Hat Decision Manager 7
Default Statusaffected
HerstellerRed Hat
Produkt Red Hat Developer Hub
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat Fuse 7
Default Statusaffected
HerstellerRed Hat
Produkt Red Hat JBoss Data Grid 7
Default Statusaffected
HerstellerRed Hat
Produkt Red Hat JBoss Enterprise Application Platform 6
Default Statusunknown
HerstellerRed Hat
Produkt Red Hat JBoss Enterprise Application Platform 6
Default Statusunknown
HerstellerRed Hat
Produkt Red Hat JBoss Enterprise Application Platform 6
Default Statusunknown
HerstellerRed Hat
Produkt Red Hat JBoss Enterprise Application Platform 7
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat JBoss Enterprise Application Platform 8
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat JBoss Enterprise Application Platform Expansion Pack
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat OpenShift GitOps
Default Statusaffected
HerstellerRed Hat
Produkt Red Hat Process Automation 7
Default Statusaffected
HerstellerRed Hat
Produkt Red Hat Single Sign-On 7
Default Statusaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.258
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secalert@redhat.com 6 0.5 5.5
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.