First published: Mon May 18 2020(Updated: )
A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | =10.0.1 | |
Redhat Single Sign-on | <7.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2020-10748.
The severity of CVE-2020-10748 is medium with a CVSS score of 6.1.
The affected software for CVE-2020-10748 includes Keycloak version 10.0.1 and Redhat Single Sign-on up to version 7.4.1.
An attacker can exploit this vulnerability to conduct cross-site scripting or further attacks.
To fix CVE-2020-10748, update Keycloak to version 7.4.1 or above.