Lucene search

K
osvGoogleOSV:GHSA-8RMM-GM28-PJ8Q
HistoryApr 17, 2024 - 5:33 p.m.

Keycloak Cross-site Scripting (XSS) via assertion consumer service URL in SAML POST-binding flow

2024-04-1717:33:04
Google
osv.dev
6
keycloak
saml
acs
xss
vulnerability
javascript
form
security
url

6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Keycloak allows arbitrary URLs as SAML Assertion Consumer Service POST Binding URL (ACS), including JavaScript URIs (javascript:).

Allowing JavaScript URIs in combination with HTML forms leads to JavaScript evaluation in the context of the embedding origin on form submission.

Acknowledgements:

Special thanks to Lauritz Holtmann for reporting this issue and helping us improve our project.

6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%