GHSA-m98g-63qj-fp8j

Suggest an improvement
Source
https://github.com/advisories/GHSA-m98g-63qj-fp8j
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-m98g-63qj-fp8j/GHSA-m98g-63qj-fp8j.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m98g-63qj-fp8j
Published
2022-04-28T21:01:28Z
Modified
2024-11-28T05:40:56.914808Z
Summary
Reflected XSS on clients-registrations endpoint
Details

A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak. When a malicious request is sent to the client registration endpoint, the error message is not properly escaped, allowing an attacker to execute malicious scripts into the user's browser.

Acknowledgement

Keycloak would like to thank Quentin TEXIER (Pentester at Opencyber) for reporting this issue.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-04-28T21:01:28Z"
}
References

Affected packages

Maven / org.keycloak:keycloak-parent

Package

Name
org.keycloak:keycloak-parent
View open source insights on deps.dev
Purl
pkg:maven/org.keycloak/keycloak-parent

Affected ranges

Type
ECOSYSTEM
Events
Introduced
10.0.0
Fixed
18.0.0

Affected versions

10.*

10.0.0
10.0.1
10.0.2

11.*

11.0.0
11.0.1
11.0.2
11.0.3

12.*

12.0.0
12.0.1
12.0.2
12.0.3
12.0.4

13.*

13.0.0
13.0.1

14.*

14.0.0

15.*

15.0.0
15.0.1
15.0.2
15.1.0
15.1.1

16.*

16.0.0
16.1.0
16.1.1

17.*

17.0.0
17.0.1