A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login.
2018-11-13T19:29:00.307
2024-11-21T03:49:31.257
Modified
CVSSv3.0: 4.6 (MEDIUM)
AV:N/AC:M/Au:S/C:N/I:P/A:N
6.8
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | keycloak | 3.4.3 | Yes |
Application | redhat | keycloak | 4.0.0 | Yes |
Application | redhat | keycloak | 4.3.0 | Yes |
Application | redhat | single_sign-on | 7.2 | Yes |
Operating System | redhat | linux | 7.0 | No |
Application | redhat | single_sign-on | 7.2 | Yes |
Operating System | redhat | linux | 6.0 | No |
Application | redhat | single_sign-on | - | Yes |