Severity
5.4MEDIUM
EPSS
2.5%
top 14.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14
Latest updateJan 23

Description

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:NExploitability: 2.1 | Impact: 2.5

Affected Packages4 packages

Also affects: Openshift Container Platform 4.11, 4.12, 4.10, 4.9

🔴Vulnerability Details

5
GHSA
keycloak-core: open redirect via "form_post.jwt" JARM response mode2024-01-23
GHSA
Duplicate Advisory: Keycloak Open Redirect vulnerability2023-12-19
GHSA
Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri2023-12-18
OSV
Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri2023-12-18
CVEList
Keycloak: reflected xss via wildcard in oidc redirect_uri2023-12-14

📋Vendor Advisories

3
Red Hat
keycloak-core: Reflected XSS via wildcard in OIDC redirect_uri. Incomplete fix of CVE-2023-61342023-12-18
Red Hat
keycloak: open redirect via "form_post.jwt" JARM response mode2023-12-18
Red Hat
keycloak: reflected XSS via wildcard in OIDC redirect_uri2023-11-14