First published: Fri Nov 25 2022(Updated: )
A flaw was found in Keycloak package. This flaw allows an attacker to benefit from Cross-Site Scripting by sending a script via URL. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise the user details, may it be changed or collected by the attacker. An administrator who might be affected may also compromise the server data.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | ||
Redhat Single Sign-on | =7.6 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
maven/org.keycloak:keycloak-parent | <20.0.5 | 20.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-4137 is a reflected cross-site scripting (XSS) vulnerability found in the 'oob' OAuth endpoint of Keycloak.
The severity of CVE-2022-4137 is high, with a CVSS score of 8.1.
The affected software for CVE-2022-4137 includes Redhat Keycloak, Redhat Single Sign-on, and Redhat Enterprise Linux (versions 7.0, 8.0, 9.0).
CVE-2022-4137 allows a malicious link to insert an arbitrary URI into a Keycloak error page through the 'oob' OAuth endpoint.
To fix CVE-2022-4137, update your Keycloak installation to versions 0:18.0.6-1.redhat_00001.1.el7, 0:18.0.6-1.redhat_00001.1.el8, or 0:18.0.6-1.redhat_00001.1.el9.