Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12158

Опубликовано: 17 окт. 2017
Источник: redhat
CVSS3: 5.4

Описание

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

It was found that keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Mobile Application Platform 4keycloakWill not fix
Red Hat Single Sign-On 7.1FixedRHSA-2017:290617.10.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-keycloakFixedRHSA-2017:290417.10.2017
Red Hat Single Sign-On 7.1 for RHEL 7rh-sso7-keycloakFixedRHSA-2017:290517.10.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1489161keycloak: reflected XSS using HOST header

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
nvd
больше 8 лет назад

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

CVSS3: 5.4
debian
больше 8 лет назад

It was found that Keycloak would accept a HOST header URL in the admin ...

CVSS3: 5.4
github
больше 3 лет назад

Keycloak Reflected XSS

5.4 Medium

CVSS3