It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
CPE | Name | Operator | Version |
---|---|---|---|
org.keycloak:keycloak-parent | lt | 3.4.0 |
access.redhat.com/errata/RHSA-2017:2904
access.redhat.com/errata/RHSA-2017:2905
access.redhat.com/errata/RHSA-2017:2906
bugzilla.redhat.com/show_bug.cgi?id=1489161
github.com/advisories/GHSA-v38p-mqq3-m6v5
nvd.nist.gov/vuln/detail/CVE-2017-12158
web.archive.org/web/20210124114020/www.securityfocus.com/bid/101618