First published: Tue Jun 16 2020(Updated: )
A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:9.0.9-1.redhat_00001.1.el6 | 0:9.0.9-1.redhat_00001.1.el6 |
redhat/rh-sso7-keycloak | <0:9.0.9-1.redhat_00001.1.el7 | 0:9.0.9-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:9.0.9-1.redhat_00001.1.el8 | 0:9.0.9-1.redhat_00001.1.el8 |
redhat/rh-sso7-libunix-dbus-java | <0:0.8.0-2.el8 | 0:0.8.0-2.el8 |
Redhat Keycloak | <12.0.0 | |
redhat/keycloak | <12.0.0 | 12.0.0 |
maven/org.keycloak:keycloak-services | <12.0.0 | 12.0.0 |
maven/org.keycloak:keycloak-server-spi-private | <12.0.0 | 12.0.0 |
Trusted Hosts Policy could be used to mitigate this attack : https://www.keycloak.org/docs/latest/securing_apps/index.html#client-registration-policies
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-10776 is a vulnerability found in Keycloak before version 12.0.0 that allows an attacker to perform a Cross-site scripting attack.
CVE-2020-10776 has a severity level of medium (4) based on the CVSS score.
An attacker can exploit CVE-2020-10776 by adding unsafe schemes for the redirect_uri parameter, enabling them to perform a Cross-site scripting attack.
Keycloak before version 12.0.0 is affected by CVE-2020-10776.
To fix CVE-2020-10776, upgrade to Keycloak version 12.0.0 or higher.