Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-14655


A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login.


Published

2018-11-13T19:29:00.307

Last Modified

2024-11-21T03:49:31.257

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 4.6 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-79
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat keycloak 3.4.3 Yes
Application redhat keycloak 4.0.0 Yes
Application redhat keycloak 4.3.0 Yes
Application redhat single_sign-on 7.2 Yes
Operating System redhat linux 7.0 No
Application redhat single_sign-on 7.2 Yes
Operating System redhat linux 6.0 No
Application redhat single_sign-on - Yes

References