First published: Tue Jun 28 2022(Updated: )
A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:15.0.8-1.redhat_00001.1.el7 | 0:15.0.8-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:15.0.8-1.redhat_00001.1.el8 | 0:15.0.8-1.redhat_00001.1.el8 |
Red Hat Single Sign-On | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-2256 is a Stored Cross-site scripting (XSS) vulnerability found in keycloak as shipped in Red Hat Single Sign-On 7.
CVE-2022-2256 allows a privileged attacker to execute malicious scripts in the admin console of Red Hat Single Sign-On 7, abusing the default roles functionality.
CVE-2022-2256 has a severity rating of 3.8 (low).
To fix CVE-2022-2256 in Red Hat Single Sign-On 7, update to version 0:15.0.8-1.redhat_00001.1.el7 (or later) for el7 or version 0:15.0.8-1.redhat_00001.1.el8 (or later) for el8.
You can find more information about CVE-2022-2256 at the following references: [RHSA-2022:6782](https://access.redhat.com/errata/RHSA-2022:6782), [RHSA-2022:6783](https://access.redhat.com/errata/RHSA-2022:6783), [RHSA-2022:6787](https://access.redhat.com/errata/RHSA-2022:6787).