Описание
HTML Injection in Keycloak Admin REST API
The execute-actions-email endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
Ссылки
- https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725
- https://nvd.nist.gov/vuln/detail/CVE-2022-1274
- https://github.com/keycloak/keycloak/pull/16764
- https://github.com/keycloak/keycloak/commit/fc3c61235fa30132123c17ed8702ff7b3a672fe9
- https://bugzilla.redhat.com/show_bug.cgi?id=2073157
- https://herolab.usd.de/security-advisories/usd-2021-0033
Пакеты
org.keycloak:keycloak-services
< 20.0.5
20.0.5
Связанные уязвимости
A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.
A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.
A flaw was found in Keycloak in the execute-actions-email endpoint. Th ...
Уязвимость программного средства для управления идентификацией и доступом Keycloak, связанная с недостатками используемых мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)