CVE-2023-6134

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*

History

14 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:0798 -
  • () https://access.redhat.com/errata/RHSA-2024:0799 -
  • () https://access.redhat.com/errata/RHSA-2024:0800 -
  • () https://access.redhat.com/errata/RHSA-2024:0801 -
  • () https://access.redhat.com/errata/RHSA-2024:0804 -

20 Dec 2023, 20:29

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2023:7857 - () https://access.redhat.com/errata/RHSA-2023:7857 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7861 - () https://access.redhat.com/errata/RHSA-2023:7861 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-6134 - () https://access.redhat.com/security/cve/CVE-2023-6134 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7858 - () https://access.redhat.com/errata/RHSA-2023:7858 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249673 - () https://bugzilla.redhat.com/show_bug.cgi?id=2249673 - Issue Tracking
References () https://access.redhat.com/errata/RHSA-2023:7860 - () https://access.redhat.com/errata/RHSA-2023:7860 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7854 - () https://access.redhat.com/errata/RHSA-2023:7854 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7856 - () https://access.redhat.com/errata/RHSA-2023:7856 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7855 - () https://access.redhat.com/errata/RHSA-2023:7855 - Vendor Advisory
CWE CWE-79
CWE-74
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*

14 Dec 2023, 22:44

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-14 22:15

Updated : 2024-02-14 03:15


NVD link : CVE-2023-6134

Mitre link : CVE-2023-6134

CVE.ORG link : CVE-2023-6134


JSON object : View

Products Affected

redhat

  • openshift_container_platform
  • enterprise_linux
  • single_sign-on
  • openshift_container_platform_for_power
  • keycloak
  • openshift_container_platform_ibm_z_systems
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')