A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2023:7854 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2023:7855 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2023:7856 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2023:7857 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2023:7858 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2023:7860 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2023:7861 | Vendor Advisory |
| https://access.redhat.com/security/cve/CVE-2023-6134 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2249673 | Issue Tracking |
Information
Published : 2023-12-14 22:15
Updated : 2023-12-29 05:15
NVD link : CVE-2023-6134
Mitre link : CVE-2023-6134
JSON object : View
Products Affected
redhat
- single_sign-on
- keycloak
