A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
Amq Broker
Subscribe
Build Keycloak
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Enterprise Brms Platform
Subscribe
Jboss Fuse
Subscribe
Jbosseapxp
Subscribe
Migration Toolkit Applications
Subscribe
Openshift Gitops
Subscribe
Openshift Serverless
Subscribe
Quarkus
Subscribe
Red Hat Single Sign On
Subscribe
Rhdh
Subscribe
Service Registry
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1164 | A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance. |
Github GHSA |
GHSA-8rmm-gm28-pj8q | Keycloak Cross-site Scripting (XSS) via assertion consumer service URL in SAML POST-binding flow |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Aug 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 29 Aug 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13 |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-01-03T12:05:05.207Z
Reserved: 2023-12-12T07:30:43.924Z
Link: CVE-2023-6717
Updated: 2024-08-02T08:35:14.887Z
Status : Awaiting Analysis
Published: 2024-04-25T16:15:10.653
Modified: 2024-11-21T08:44:24.813
Link: CVE-2023-6717
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA