CVE-2023-6717
Description
A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.
CWE
- CWE-79 — Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected
- / — v=0 <22.0.10 [affected]; v=24.0.0 <24.0.3 [affected]
- Red Hat / Red Hat AMQ Broker 7 —
- Red Hat / Red Hat build of Keycloak 22 — v=22.0.10-1 <* [unaffected]
- Red Hat / Red Hat build of Keycloak 22 — v=22-13 <* [unaffected]
- Red Hat / Red Hat build of Keycloak 22 — v=22-16 <* [unaffected]
- Red Hat / Red Hat build of Keycloak 22.0.10 —
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-3 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHOSS-1.33-RHEL-8 — v=1.33.0-5 <* [unaffected]
- Red Hat / RHPAM 7.13.5 async —
- Red Hat / Migration Toolkit for Applications 6 —
- Red Hat / Migration Toolkit for Applications 7 —
- Red Hat / Red Hat build of Apicurio Registry 2 —
- Red Hat / Red Hat build of Quarkus —
- Red Hat / Red Hat build of Quarkus —
- Red Hat / Red Hat Data Grid 8 —
- Red Hat / Red Hat Decision Manager 7 —
- Red Hat / Red Hat Developer Hub —
- Red Hat / Red Hat Fuse 7 —
- Red Hat / Red Hat JBoss Data Grid 7 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 6 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 6 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 6 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 7 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 8 —
- Red Hat / Red Hat JBoss Enterprise Application Platform Expansion Pack —
- Red Hat / Red Hat OpenShift GitOps —
- Red Hat / Red Hat Process Automation 7 —
- Red Hat / Red Hat Single Sign-On 7 —
CVSS
- 3.1 score=6 severity=MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
References
- https://access.redhat.com/errata/RHSA-2024:1353 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:1867 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:1868 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:2945 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:4057 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-6717 vdb-entry, x_refsource_REDHAT
- https://bugzilla.redhat.com/show_bug.cgi?id=2253952 issue-tracking, x_refsource_REDHAT
Source
cvelistV5-main/cves/2023/6xxx/CVE-2023-6717.json