First published: Mon Dec 13 2021(Updated: )
A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | <=21.0.0 | |
Redhat Keycloak | ||
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-1438.
The severity of CVE-2022-1438 is medium (6.4).
CVE-2022-1438 occurs when HTML entities are not sanitized during user impersonation in Keycloak, resulting in a Cross-site scripting (XSS) vulnerability.
The following software versions are affected by CVE-2022-1438: - keycloak-services version 21.0.0 - rh-sso7-keycloak versions up to 0:18.0.6-1.redhat_00001.1.el7, 0:18.0.6-1.redhat_00001.1.el8, and 0:18.0.6-1.redhat_00001.1.el9 - Redhat Keycloak
CVE-2022-1438 can be fixed by upgrading Keycloak to a version that includes the necessary fixes. Refer to the provided references for more details.