A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.
References
Configurations
No configuration.
History
29 Aug 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
25 Apr 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-25 16:15
Updated : 2024-08-29 19:15
NVD link : CVE-2023-6717
Mitre link : CVE-2023-6717
CVE.ORG link : CVE-2023-6717
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')