Lucene search

K
githubGitHub Advisory DatabaseGHSA-8RMM-GM28-PJ8Q
HistoryApr 17, 2024 - 5:33 p.m.

Keycloak Cross-site Scripting (XSS) via assertion consumer service URL in SAML POST-binding flow

2024-04-1717:33:04
CWE-20
CWE-79
CWE-601
GitHub Advisory Database
github.com
11
keycloak
saml
xss
javascript
html forms
security
vulnerability
report
acknowledgement
url
post-binding

6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Keycloak allows arbitrary URLs as SAML Assertion Consumer Service POST Binding URL (ACS), including JavaScript URIs (javascript:).

Allowing JavaScript URIs in combination with HTML forms leads to JavaScript evaluation in the context of the embedding origin on form submission.

Acknowledgements:

Special thanks to Lauritz Holtmann for reporting this issue and helping us improve our project.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices
OR
org.keycloak\keycloakMatchservices

6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%