First published: Mon Dec 11 2023(Updated: )
Keycloak allows arbitrary URLs as SAML Assertion Consumer Service POST Binding URL (ACS), including JavaScript URIs (javascript:). Allowing JavaScript URIs in combination with HTML forms leads to JavaScript evaluation in the context of the embedding origin on form submission. Thus, Keycloak is vulnerable to Cross-Site Scripting (XXS) by registering a JavaScript URI as Assertion Consumer Service POST Binding URL.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2253952 is critical due to the potential for arbitrary JavaScript execution.
To fix REDHAT-BUG-2253952, update Keycloak to the latest version that addresses this vulnerability.
Systems running affected versions of Keycloak are vulnerable to REDHAT-BUG-2253952.
Exploiting REDHAT-BUG-2253952 can lead to XSS attacks by executing malicious scripts in the context of user sessions.
Yes, REDHAT-BUG-2253952 is a known vulnerability documented in the Red Hat bug tracking system.