First published: Thu Apr 07 2022(Updated: )
A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
Redhat Keycloak | <20.0.5 | |
Redhat Single Sign-on | ||
Redhat Single Sign-on | >=7.6<7.6.2 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Openshift Container Platform | =4.9 | |
Redhat Openshift Container Platform | =4.10 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.0 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.0 | |
All of | ||
Redhat Single Sign-on | >=7.6<7.6.2 | |
Any of | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
Redhat Openshift Container Platform | =4.9 | |
Redhat Openshift Container Platform | =4.10 | |
Any of | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.0 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.0 | |
maven/org.keycloak:keycloak-services | <20.0.5 | 20.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1274 is a vulnerability found in Keycloak that allows arbitrary HTML to be injected into emails sent to Keycloak users, potentially leading to phishing or other attacks.
The severity of CVE-2022-1274 is high, with a severity value of 7.6.
Versions 0:18.0.6-1.redhat_00001.1.el7, 0:18.0.6-1.redhat_00001.1.el8, and 0:18.0.6-1.redhat_00001.1.el9 of rh-sso7-keycloak are affected by CVE-2022-1274.
The CVE-2022-1274 vulnerability can be exploited by injecting arbitrary HTML into emails sent to Keycloak users, allowing for phishing or other attacks.
You can find more information about CVE-2022-1274 on the Red Hat website at the following links: [Link 1](https://access.redhat.com/errata/RHSA-2023:1043), [Link 2](https://access.redhat.com/errata/RHSA-2023:1044), [Link 3](https://access.redhat.com/errata/RHSA-2023:1045).