Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w9mf-83w3-fv49

Опубликовано: 23 сент. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.4

Описание

Keycloak vulnerable to Stored Cross site Scripting (XSS) when loading default roles

A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (18.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the default roles functionality.

CVSS 3.1 - 3.8

Vector String: AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

Vector Clarification:

  • User interaction is not required as the admin console is regularly used during an administrator's work
  • The scope is unchanged since the admin console web application is both the vulnerable component and where the exploit executes

Credits

Aytaç Kalıncı, Ilker Bulgurcu, Yasin Yılmaz (@aytackalinci, @smileronin, @yasinyilmaz) - NETAŞ PENTEST TEAM

Пакеты

Наименование

org.keycloak:keycloak-parent

maven
Затронутые версииВерсия исправления

< 19.0.2

19.0.2

EPSS

Процентиль: 75%
0.00882
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 3.8
redhat
больше 3 лет назад

A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality.

CVSS3: 3.8
nvd
больше 3 лет назад

A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality.

CVSS3: 3.8
debian
больше 3 лет назад

A Stored Cross-site scripting (XSS) vulnerability was found in keycloa ...

EPSS

Процентиль: 75%
0.00882
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-79