First published: Thu Jan 16 2020(Updated: )
A flaw was found during the assessment of the Admin Console application for Keycloak, where it was found that Application Links to external applications are not validated properly. An attacker could use this flaw to cause Stored XSS attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keycloak | <9.0.0 | 9.0.0 |
Redhat Keycloak | <9.0.0 | |
Redhat Single Sign-on | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-1697 is a vulnerability found in all versions of Keycloak before 9.0.0 that allows for Stored XSS attacks through improperly validated links to external applications in the admin console.
The severity of CVE-2020-1697 is medium, with a CVSSv3 base score of 6.1.
All versions of Keycloak before 9.0.0 are affected by CVE-2020-1697.
An authenticated malicious user can create URLs to trick users in other realms and potentially conduct further attacks by exploiting CVE-2020-1697.
The recommended solution is to update Keycloak to version 9.0.0 or later.