A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:7854 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7855 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7856 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7857 | vendor advisory exploit |
https://access.redhat.com/errata/RHSA-2023:7858 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7860 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7861 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0798 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0799 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0800 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0801 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0804 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-6134 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2249673 | issue tracking |