First published: Tue Nov 14 2023(Updated: )
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | <23.0.3 | 23.0.3 |
Redhat Single Sign-on | <7.6.6 | |
Redhat Keycloak | <22.0.7 | |
All of | ||
Redhat Single Sign-on | <7.6 | |
Any of | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
Redhat Openshift Container Platform | =4.11 | |
Redhat Openshift Container Platform | =4.12 | |
Redhat Enterprise Linux | =8.0 | |
All of | ||
Any of | ||
Redhat Openshift Container Platform For Power | =4.9 | |
Redhat Openshift Container Platform For Power | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
All of | ||
Any of | ||
Redhat Openshift Container Platform Ibm Z Systems | =4.9 | |
Redhat Openshift Container Platform Ibm Z Systems | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Single Sign-on |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.