Lucene search

K
nvd[email protected]NVD:CVE-2023-6134
HistoryDec 14, 2023 - 10:15 p.m.

CVE-2023-6134

2023-12-1422:15:44
CWE-79
web.nvd.nist.gov
1
keycloak
xss
incomplete fix

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

45.2%

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

Affected configurations

NVD
Node
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
AND
redhatsingle_sign-onRange<7.6
Node
redhatkeycloakRange<22.0.7
Node
redhatenterprise_linuxMatch8.0
AND
redhatopenshift_container_platformMatch4.11
OR
redhatopenshift_container_platformMatch4.12
Node
redhatenterprise_linuxMatch8.0
AND
redhatopenshift_container_platform_for_powerMatch4.9
OR
redhatopenshift_container_platform_for_powerMatch4.10
Node
redhatenterprise_linuxMatch8.0
AND
redhatopenshift_container_platform_ibm_z_systemsMatch4.9
OR
redhatopenshift_container_platform_ibm_z_systemsMatch4.10
Node
redhatsingle_sign-onMatch-text-only

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

45.2%