A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0968 | A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker. |
Github GHSA |
GHSA-9hhc-pj4w-w5rv | Keycloak Cross-site Scripting on OpenID connect login service |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T01:27:54.542Z
Reserved: 2022-11-24T14:10:49.215Z
Link: CVE-2022-4137
No data.
Status : Modified
Published: 2023-09-25T20:15:09.897
Modified: 2024-11-21T07:34:38.850
Link: CVE-2022-4137
OpenCVE Enrichment
No data.
EUVD
Github GHSA