First published: Fri Jan 22 2021(Updated: )
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | <12.0.3 | |
redhat/keycloak | <13.0.0 | 13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20195 is a vulnerability found in Keycloak versions before 13.0.0, which allows for a Self Stored XSS attack vector that could lead to a complete account takeover.
The severity of CVE-2021-20195 is critical with a CVSS score of 9.6.
The CVE-2021-20195 vulnerability can be exploited through a Self Stored XSS attack vector, where user-supplied data fields are not properly encoded and JavaScript code is used to process the data.
CVE-2021-20195 affects Keycloak versions before 13.0.0.
To mitigate the CVE-2021-20195 vulnerability, it is recommended to update Keycloak to version 13.0.0 or later.