CVE-2017-12158

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:redhat:single_sign_on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:keycloak:keycloak:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:08

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101618 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101618 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:2904 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2904 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2905 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2905 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2906 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2906 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1489161 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1489161 - Issue Tracking

Information

Published : 2017-10-26 17:29

Updated : 2024-11-21 03:08


NVD link : CVE-2017-12158

Mitre link : CVE-2017-12158

CVE.ORG link : CVE-2017-12158


JSON object : View

Products Affected

keycloak

  • keycloak

redhat

  • single_sign_on
  • enterprise_linux_server
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')