GHSA-px42-mr8m-cpgh

Suggest an improvement
Source
https://github.com/advisories/GHSA-px42-mr8m-cpgh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-px42-mr8m-cpgh/GHSA-px42-mr8m-cpgh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-px42-mr8m-cpgh
Aliases
  • CVE-2014-3656
Published
2022-05-17T19:57:06Z
Modified
2024-02-16T08:15:37.741595Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
JBoss KeyCloak Cross-site Scripting Vulnerability
Details

If a JBoss Keycloak application was configured to use * as a permitted web origin in the Keycloak administrative console, crafted requests to the login-status-iframe.html endpoint could inject arbitrary Javascript into the generated HTML code via the "origin" query parameter, leading to a cross-site scripting (XSS) vulnerability.

Database specific
{
    "nvd_published_at": "2019-12-10T14:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-07T20:27:41Z"
}
References

Affected packages

Maven / org.keycloak:keycloak-core

Package

Name
org.keycloak:keycloak-core
View open source insights on deps.dev
Purl
pkg:maven/org.keycloak/keycloak-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0.Beta1

Affected versions

1.*

1.0-alpha-1
1.0-alpha-1-12062013
1.0-alpha-2
1.0-alpha-3
1.0-alpha-4
1.0-beta-1
1.0-beta-1-20150521
1.0-beta-1-20150523
1.0-beta-2
1.0-beta-3
1.0-beta-4
1.0-rc-1
1.0-rc-2
1.0-final
1.0.1.Final
1.0.2.Final
1.0.3.Final
1.0.4.Final
1.0.5.Final