CVE-2022-4137

A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-25 20:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-4137

Mitre link : CVE-2022-4137

CVE.ORG link : CVE-2022-4137


JSON object : View

Products Affected

redhat

  • keycloak
  • enterprise_linux
  • single_sign-on
CWE
CWE-81

Improper Neutralization of Script in an Error Message Web Page

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')