Severity
5.4MEDIUM
EPSS
0.7%
top 28.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 26
Latest updateMay 13

Description

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages3 packages

CVEListV5red_hat,_inc./keycloak3.4.0
NVDredhat/single_sign_on7.0, 7.1+1

🔴Vulnerability Details

3
OSV
Keycloak Reflected XSS2022-05-13
GHSA
Keycloak Reflected XSS2022-05-13
CVEList
CVE-2017-12158: It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations2017-10-26

📋Vendor Advisories

1
Red Hat
keycloak: reflected XSS using HOST header2017-10-17

💬Community

1
Bugzilla
CVE-2017-12158 keycloak: reflected XSS using HOST header2017-09-06
CVE-2017-12158 (MEDIUM CVSS 5.4) | It was found that Keycloak would ac | cvebase.io