Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.
2023-07-07T20:15:09.813
2024-11-21T07:35:08.000
Modified
CVSSv3.1: 10.0 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | keycloak | < 21.1.2 | Yes |
Application | redhat | single_sign-on | < 7.6.4 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |
Operating System | redhat | enterprise_linux | 8.0 | No |
Operating System | redhat | enterprise_linux | 9.0 | No |
Application | redhat | single_sign-on | - | Yes |
Application | redhat | openshift_container_platform | 4.11 | Yes |
Application | redhat | openshift_container_platform | 4.12 | Yes |
Application | redhat | openshift_container_platform_for_ibm_linuxone | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_ibm_linuxone | 4.10 | Yes |
Application | redhat | openshift_container_platform_for_power | 4.9 | Yes |
Application | redhat | openshift_container_platform_for_power | 4.10 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | No |