Lucene search

K
githubGitHub Advisory DatabaseGHSA-W9MF-83W3-FV49
HistorySep 23, 2022 - 4:32 p.m.

Keycloak vulnerable to Stored Cross site Scripting (XSS) when loading default roles

2022-09-2316:32:51
CWE-79
GitHub Advisory Database
github.com
419
keycloak
stored cross site scripting
default roles
admin console
vulnerability
privileged attacker
netaş pentest team
cvss 3.1

3.8 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

22.7%

A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (18.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the default roles functionality.

CVSS 3.1 - 3.8

Vector String: AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

Vector Clarification:

  • User interaction is not required as the admin console is regularly used during an administrator’s work
  • The scope is unchanged since the admin console web application is both the vulnerable component and where the exploit executes

Credits

Aytaç Kalıncı, Ilker Bulgurcu, Yasin Yılmaz (@aytackalinci, @smileronin, @yasinyilmaz) - NETAŞ PENTEST TEAM

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchparent
CPENameOperatorVersion
org.keycloak:keycloak-parentlt19.0.2

3.8 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

22.7%