Lucene search

K
githubGitHub Advisory DatabaseGHSA-FQC7-5XXC-PH7R
HistoryAug 27, 2022 - 12:00 a.m.

Keycloak XSS via use of malicious payload as group name when creating new group from admin console

2022-08-2700:00:44
CWE-79
GitHub Advisory Database
github.com
81
keycloak
xss
admin console

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

24.8%

A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchcore
CPENameOperatorVersion
org.keycloak:keycloak-corele16.1.0

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

24.8%