Description
A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login.
Published: 2018-11-13
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-2302 A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login.
Github GHSA Github GHSA GHSA-458h-wv48-fq75 Keycloak vulnerable to cross-site scripting via the state parameter
History

No history.

Subscriptions

Redhat Jboss Single Sign On Keycloak Linux Red Hat Single Sign On Single Sign-on
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T09:38:13.384Z

Reserved: 2018-07-27T00:00:00.000Z

Link: CVE-2018-14655

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-13T19:29:00.307

Modified: 2024-11-21T03:49:31.257

Link: CVE-2018-14655

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-11-13T17:37:00Z

Links: CVE-2018-14655 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses