First published: Tue Sep 04 2018(Updated: )
A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-parent | =4.3.0.Final | |
maven/org.keycloak:keycloak-parent | >=4.0.0.Beta1<=4.0.0.Beta2 | |
maven/org.keycloak:keycloak-parent | <=3.4.3.Final | |
Redhat Keycloak | =3.4.3 | |
Redhat Keycloak | =4.0.0-beta2 | |
Redhat Keycloak | =4.3.0 | |
Redhat Single Sign-on | =7.2 | |
Redhat Linux | =7.0 | |
Redhat Linux | =6.0 | |
Redhat Single Sign-on |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14655 is a vulnerability found in Keycloak 3.4.3.Final, 4.0.0.Beta2, and 4.3.0.Final that allows an XSS-Attack upon successful login by injecting arbitrary JavaScript code via the 'state'-parameter in the authentication URL.
CVE-2018-14655 has a severity rating of medium, with a CVSS score of 5.4.
Keycloak versions 3.4.3.Final, 4.0.0.Beta2, and 4.3.0.Final are affected by CVE-2018-14655.
To fix CVE-2018-14655, it is recommended to update Keycloak to a version that is not affected, such as a version newer than 4.3.0.Final.
You can find more information about CVE-2018-14655 on the NIST NVD website and the Red Hat security advisories RHSA-2018:3592 and RHSA-2018:3593.