Bug 2253952 (CVE-2023-6717) - CVE-2023-6717 keycloak: XSS via assertion consumer service URL in SAML POST-binding flow
Summary: CVE-2023-6717 keycloak: XSS via assertion consumer service URL in SAML POST-b...
Keywords:
Status: NEW
Alias: CVE-2023-6717
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2253608
TreeView+ depends on / blocked
 
Reported: 2023-12-11 08:34 UTC by TEJ RATHI
Modified: 2024-06-24 01:38 UTC (History)
84 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:1867 0 None None None 2024-04-16 20:27:01 UTC
Red Hat Product Errata RHSA-2024:1868 0 None None None 2024-04-16 20:26:33 UTC
Red Hat Product Errata RHSA-2024:2945 0 None None None 2024-05-21 14:18:48 UTC
Red Hat Product Errata RHSA-2024:4057 0 None None None 2024-06-24 01:38:34 UTC

Description TEJ RATHI 2023-12-11 08:34:32 UTC
Keycloak allows arbitrary URLs as SAML Assertion Consumer Service POST Binding URL (ACS), including JavaScript URIs (javascript:). Allowing JavaScript URIs in combination with HTML forms leads to JavaScript evaluation in the context of the embedding origin on form submission. Thus, Keycloak is vulnerable to Cross-Site Scripting (XXS) by registering a JavaScript URI as Assertion Consumer Service POST Binding URL.

Comment 9 errata-xmlrpc 2024-04-16 20:26:29 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 22.0.10

Via RHSA-2024:1868 https://access.redhat.com/errata/RHSA-2024:1868

Comment 10 errata-xmlrpc 2024-04-16 20:26:58 UTC
This issue has been addressed in the following products:

  Red Hat build of Keycloak 22

Via RHSA-2024:1867 https://access.redhat.com/errata/RHSA-2024:1867

Comment 12 errata-xmlrpc 2024-05-21 14:18:42 UTC
This issue has been addressed in the following products:

  Red Hat JBoss AMQ

Via RHSA-2024:2945 https://access.redhat.com/errata/RHSA-2024:2945

Comment 15 errata-xmlrpc 2024-06-24 01:38:30 UTC
This issue has been addressed in the following products:

  RHOSS-1.33-RHEL-8

Via RHSA-2024:4057 https://access.redhat.com/errata/RHSA-2024:4057


Note You need to log in before you can comment on or make changes to this bug.