CVE-2023-6717 – org.keycloak:keycloak-services
Package
Manager: maven
Name: org.keycloak:keycloak-services
Vulnerable Version: >=0 <22.0.10 || >=23.0.0 <24.0.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00065 pctl0.2058
Details
Keycloak Cross-site Scripting (XSS) via assertion consumer service URL in SAML POST-binding flow Keycloak allows arbitrary URLs as SAML Assertion Consumer Service POST Binding URL (ACS), including JavaScript URIs (javascript:). Allowing JavaScript URIs in combination with HTML forms leads to JavaScript evaluation in the context of the embedding origin on form submission. #### Acknowledgements: Special thanks to Lauritz Holtmann for reporting this issue and helping us improve our project.
Metadata
Created: 2024-04-17T17:33:04Z
Modified: 2024-08-29T21:31:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-8rmm-gm28-pj8q/GHSA-8rmm-gm28-pj8q.json
CWE IDs: ["CWE-20", "CWE-601", "CWE-79"]
Alternative ID: GHSA-8rmm-gm28-pj8q
Finding: F008
Auto approve: 1